Red Hat Network (RHN) Satellite Server 5.4 does not use a time delay after a failed login attempt, which makes it easier for remote attackers to conduct brute force password guessing attacks.
References
Configurations
History
21 Nov 2024, 01:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/43487 - Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2011-0300.html - | |
References | () http://www.securityfocus.com/bid/46528 - | |
References | () http://www.securitytracker.com/id?1025116 - | |
References | () http://www.vupen.com/english/advisories/2011/0491 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=672159 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/65657 - |
Information
Published : 2011-02-25 19:00
Updated : 2024-11-21 01:24
NVD link : CVE-2011-0718
Mitre link : CVE-2011-0718
CVE.ORG link : CVE-2011-0718
JSON object : View
Products Affected
redhat
- network_satellite_server
CWE
CWE-287
Improper Authentication