First published: Sat Aug 04 2001(Updated: )
NetWin SurgeFTP 2.0f and earlier encrypts passwords using weak hashing, a fixed salt value and modulo 40 calculations, which allows remote attackers to conduct brute force password guessing attacks against the administrator account on port 7021.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SurgeFTP | =2.0a | |
SurgeFTP | =2.0b | |
SurgeFTP | =2.0c | |
SurgeFTP | =2.0d | |
SurgeFTP | =2.0e | |
SurgeFTP | =2.0f |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1356 is considered a medium severity vulnerability due to its potential for brute force password attacks.
To fix CVE-2001-1356, update to a later version of NetWin SurgeFTP that addresses the weak password hashing mechanism.
CVE-2001-1356 affects NetWin SurgeFTP versions 2.0a through 2.0f.
CVE-2001-1356 allows remote attackers to conduct brute force password guessing attacks against the administrator account.
CVE-2001-1356 presents a vulnerability on port 7021.