CVE-2005-0798

Novell iChain Mini FTP Server 2.3, and possibly earlier versions, does not limit the number of incorrect logins, which makes it easier for remote attackers to conduct brute force login attacks.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:novell:ichain:2.2:*:*:*:*:*:*:*
cpe:2.3:a:novell:ichain:2.2:sp1:*:*:*:*:*:*
cpe:2.3:a:novell:ichain:2.2:sp1a:*:*:*:*:*:*
cpe:2.3:a:novell:ichain:2.2:sp2:*:*:*:*:*:*
cpe:2.3:a:novell:ichain:2.2:sp3:*:*:*:*:*:*
cpe:2.3:a:novell:ichain:2.2.113:*:*:*:*:*:*:*
cpe:2.3:a:novell:ichain:2.3:*:*:*:*:*:*:*
cpe:2.3:a:novell:ichain:2.3:sp2:*:*:*:*:*:*

History

20 Nov 2024, 23:55

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=111091517007681&w=2 - () http://marc.info/?l=bugtraq&m=111091517007681&w=2 -
References () http://secunia.com/advisories/14607 - Vendor Advisory () http://secunia.com/advisories/14607 - Vendor Advisory
References () http://securitytracker.com/id?1013408 - () http://securitytracker.com/id?1013408 -
References () http://support.novell.com/cgi-bin/search/searchtid.cgi?/10096887.htm - Vendor Advisory () http://support.novell.com/cgi-bin/search/searchtid.cgi?/10096887.htm - Vendor Advisory
References () http://www.infobyte.com.ar/adv/ISR-05.html - Vendor Advisory () http://www.infobyte.com.ar/adv/ISR-05.html - Vendor Advisory
References () http://www.osvdb.org/14648 - () http://www.osvdb.org/14648 -

Information

Published : 2005-03-15 05:00

Updated : 2024-11-20 23:55


NVD link : CVE-2005-0798

Mitre link : CVE-2005-0798

CVE.ORG link : CVE-2005-0798


JSON object : View

Products Affected

novell

  • ichain