CVE-2005-0744

The web GUI for Novell iChain 2.2 and 2.3 SP2 and SP3 allows attackers to hijack sessions and gain administrator privileges by (1) sniffing the connection on TCP port 51100 and replaying the authentication information or (2) obtaining and replaying the PCZQX02 authentication cookie from the browser.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:novell:ichain:2.2:*:*:*:*:*:*:*
cpe:2.3:a:novell:ichain:2.3:*:*:*:*:*:*:*

History

20 Nov 2024, 23:55

Type Values Removed Values Added
References () http://secunia.com/advisories/14527 - Patch, Vendor Advisory () http://secunia.com/advisories/14527 - Patch, Vendor Advisory
References () http://securitytracker.com/id?1013406 - () http://securitytracker.com/id?1013406 -
References () http://support.novell.com/cgi-bin/search/searchtid.cgi?/10096885.htm - Patch () http://support.novell.com/cgi-bin/search/searchtid.cgi?/10096885.htm - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/19646 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/19646 -

Information

Published : 2005-05-02 04:00

Updated : 2024-11-20 23:55


NVD link : CVE-2005-0744

Mitre link : CVE-2005-0744

CVE.ORG link : CVE-2005-0744


JSON object : View

Products Affected

novell

  • ichain