First published: Wed Jan 28 2004(Updated: )
Oracle toplink mapping workBench uses a weak encryption algorithm for passwords, which allows local users to decrypt the passwords.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Application Server | =9.0.2.1 | |
Oracle Application Server | =9.0.2.0.0 | |
Oracle Application Server | =9.0.2.3 | |
Oracle Application Server | =9.0.2.0.1 | |
Oracle Application Server | =9.0.2.2 | |
Oracle Application Server | =9.0.2 | |
Oracle Application Server | =9.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-2134 is classified as a medium severity vulnerability due to its impact on password security.
To fix CVE-2004-2134, upgrade to a version of Oracle Application Server that employs a stronger encryption algorithm for passwords.
The affected versions of Oracle Application Server include 9.0.2.0.0, 9.0.2.1, 9.0.2.2, 9.0.2.3, and 9.0.3.
Yes, local users can exploit CVE-2004-2134 to decrypt passwords stored using the weak encryption algorithm.
CVE-2004-2134 is a cryptography vulnerability resulting from the use of a weak encryption algorithm for storing passwords.