First published: Thu Dec 10 1998(Updated: )
RealSystem G2 server stores the administrator password in cleartext in a world-readable configuration file, which allows local users to gain privileges.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealNetworks RealSystem G2 Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-1282 is considered a high severity vulnerability due to the exposure of the administrator password in cleartext.
To fix CVE-1999-1282, you should change the configuration file permissions to restrict access and ensure that passwords are stored securely, not in cleartext.
Any local users with access to the configuration file of the RealSystem G2 server are affected by CVE-1999-1282.
Realnetworks Realsystem G2 Server installations are vulnerable to CVE-1999-1282 if they store the administrator password in a world-readable configuration file.
An attacker exploiting CVE-1999-1282 can gain unauthorized privileges on the system by accessing the cleartext administrator password.