First published: Fri Dec 31 2004(Updated: )
Inter7 SqWebMail 3.4.1 through 3.6.1 generates different error messages for incorrect passwords versus correct passwords on non-mail-enabled accounts (such as root), which allows remote attackers to guess the root password via brute force attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Inter7 Vpopmail (vchkpw) | =3.4.1 | |
Inter7 Vpopmail (vchkpw) | =3.5.0 | |
Inter7 Vpopmail (vchkpw) | =3.5.1 | |
Inter7 Vpopmail (vchkpw) | =3.5.2 | |
Inter7 Vpopmail (vchkpw) | =3.5.3 | |
Inter7 Vpopmail (vchkpw) | =3.6.0 | |
Inter7 Vpopmail (vchkpw) | =3.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-2313 is considered a high severity vulnerability due to its potential for remote exploitation through brute force attacks.
To fix CVE-2004-2313, upgrade to a version of Inter7 SqWebMail that is not affected, specifically versions beyond 3.6.1.
CVE-2004-2313 affects Inter7 SqWebMail versions from 3.4.1 to 3.6.1.
CVE-2004-2313 facilitates brute force attacks on non-mail-enabled accounts by revealing different responses based on password correctness.
Yes, CVE-2004-2313 is directly related to user authentication vulnerabilities that allow attackers to exploit incorrect password handling.