First published: Mon Nov 19 2001(Updated: )
The remote administration client for RhinoSoft Serv-U 3.0 sends the user password in plaintext even when S/KEY One-Time Password (OTP) authentication is enabled, which allows remote attackers to sniff passwords.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Solarwinds Serv-u File Server | =3.0.0.16 | |
Solarwinds Serv-u File Server | =3.0.0.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1463 is classified as a high severity vulnerability due to the exposure of user passwords in plaintext.
To mitigate CVE-2001-1463, upgrade to a version of RhinoSoft Serv-U that does not transmit passwords in plaintext.
CVE-2001-1463 affects RhinoSoft Serv-U versions 3.0.0.16 and 3.0.0.17.
CVE-2001-1463 enables attackers to sniff user passwords through unsecured transmission during the remote administration process.
No, enabling S/KEY One-Time Password does not prevent CVE-2001-1463 as the passwords are still sent in plaintext.