CVE-2013-4114

The automatic update request in Nagstamont before 0.9.10 uses a cleartext base64 format for transmission of a username and password, which allows remote attackers to obtain sensitive information by sniffing the network.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:henri_wahl:nagstamon:*:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.5.2:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.5.3:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.5.4:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.5.5:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.5.6:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.5.7:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.5.8:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.5.9:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.5.10:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.5.11:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.5.13:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.6:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.9.6.1:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.9.7.1:*:*:*:*:*:*:*
cpe:2.3:a:henri_wahl:nagstamon:0.9.8:*:*:*:*:*:*:*

History

21 Nov 2024, 01:54

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-updates/2013-07/msg00072.html - () http://lists.opensuse.org/opensuse-updates/2013-07/msg00072.html -
References () http://nagstamon.ifw-dresden.de/docs/security/ - () http://nagstamon.ifw-dresden.de/docs/security/ -
References () http://secunia.com/advisories/54072 - Vendor Advisory () http://secunia.com/advisories/54072 - Vendor Advisory
References () http://secunia.com/advisories/54276 - Vendor Advisory () http://secunia.com/advisories/54276 - Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2013/07/11/7 - () http://www.openwall.com/lists/oss-security/2013/07/11/7 -
References () https://bugs.gentoo.org/show_bug.cgi?id=476538 - () https://bugs.gentoo.org/show_bug.cgi?id=476538 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=983673 - () https://bugzilla.redhat.com/show_bug.cgi?id=983673 -

Information

Published : 2013-08-16 17:55

Updated : 2024-11-21 01:54


NVD link : CVE-2013-4114

Mitre link : CVE-2013-4114

CVE.ORG link : CVE-2013-4114


JSON object : View

Products Affected

henri_wahl

  • nagstamon
CWE
CWE-255

Credentials Management Errors