First published: Fri Aug 31 2001(Updated: )
Respondus 1.1.2 for WebCT uses weak encryption to remember usernames and passwords, which allows local users who can read the WEBCT.SVR file to decrypt the passwords and gain additional privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WebCT | =1.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1003 is rated as a high severity vulnerability due to the weak encryption used, which can lead to unauthorized access.
To fix CVE-2001-1003, upgrade to a version of Respondus that uses stronger encryption methods for storing credentials.
The risks include unauthorized access to sensitive information and potential escalation of privileges for local users.
Users of Respondus 1.1.2 for WebCT are affected by CVE-2001-1003 due to its insecure handling of usernames and passwords.
There are no recommended workarounds for CVE-2001-1003; upgrading to a secure version is the best course of action.