The automatic update request in Nagstamont before 0.9.10 uses a cleartext base64 format for transmission of a username and password, which allows remote attackers to obtain sensitive information by sniffing the network.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-updates/2013-07/msg00072.html - | |
References | () http://nagstamon.ifw-dresden.de/docs/security/ - | |
References | () http://secunia.com/advisories/54072 - Vendor Advisory | |
References | () http://secunia.com/advisories/54276 - Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2013/07/11/7 - | |
References | () https://bugs.gentoo.org/show_bug.cgi?id=476538 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=983673 - |
Information
Published : 2013-08-16 17:55
Updated : 2024-11-21 01:54
NVD link : CVE-2013-4114
Mitre link : CVE-2013-4114
CVE.ORG link : CVE-2013-4114
JSON object : View
Products Affected
henri_wahl
- nagstamon
CWE
CWE-255
Credentials Management Errors