The web GUI for Novell iChain 2.2 and 2.3 SP2 and SP3 allows attackers to hijack sessions and gain administrator privileges by (1) sniffing the connection on TCP port 51100 and replaying the authentication information or (2) obtaining and replaying the PCZQX02 authentication cookie from the browser.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/14527 - Patch, Vendor Advisory | |
References | () http://securitytracker.com/id?1013406 - | |
References | () http://support.novell.com/cgi-bin/search/searchtid.cgi?/10096885.htm - Patch | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/19646 - |
Information
Published : 2005-05-02 04:00
Updated : 2024-11-20 23:55
NVD link : CVE-2005-0744
Mitre link : CVE-2005-0744
CVE.ORG link : CVE-2005-0744
JSON object : View
Products Affected
novell
- ichain
CWE