CVE-2016-2379

The Mxit protocol uses weak encryption when encrypting user passwords, which might allow attackers to (1) decrypt hashed passwords by leveraging knowledge of client registration codes or (2) gain login access by eavesdropping on login messages and re-using the hashed passwords.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pidgin:mxit:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:48

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/91335 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/91335 - Third Party Advisory, VDB Entry
References () http://www.talosintelligence.com/reports/TALOS-2016-0122/ - Third Party Advisory () http://www.talosintelligence.com/reports/TALOS-2016-0122/ - Third Party Advisory
References () https://pidgin.im/news/security/?id=95 - Vendor Advisory () https://pidgin.im/news/security/?id=95 - Vendor Advisory
References () https://security.gentoo.org/glsa/201701-38 - Third Party Advisory () https://security.gentoo.org/glsa/201701-38 - Third Party Advisory

Information

Published : 2017-03-29 20:59

Updated : 2024-11-21 02:48


NVD link : CVE-2016-2379

Mitre link : CVE-2016-2379

CVE.ORG link : CVE-2016-2379


JSON object : View

Products Affected

pidgin

  • mxit
CWE
CWE-326

Inadequate Encryption Strength