First published: Sat Aug 02 2003(Updated: )
Novell iChain 2.2 before Support Pack 1 uses a shorter timeout for a non-existent user than a valid user, which makes it easier for remote attackers to guess usernames and conduct brute force password guessing.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell iChain | =2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0637 is considered a medium severity vulnerability due to the potential for username enumeration and brute force password guessing.
To fix CVE-2003-0637, update Novell iChain to version 2.2 Support Pack 1 or a later version.
CVE-2003-0637 affects users of Novell iChain version 2.2 prior to Support Pack 1.
CVE-2003-0637 may allow attackers to successfully guess valid usernames, increasing the risk of unauthorized access.
As an immediate workaround for CVE-2003-0637, consider implementing account lockout policies to mitigate brute force attempts.