First published: Fri Dec 31 2004(Updated: )
Novell iChain 2.3 includes the build number in the VIA line of the proxy server's HTTP headers, which allows remote attackers to obtain sensitive information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell iChain | =2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-2582 has a moderate severity rating as it exposes sensitive information that could be leveraged by attackers.
To fix CVE-2004-2582, upgrade to a version of Novell iChain that does not disclose the build number in the HTTP headers.
CVE-2004-2582 allows attackers to obtain potentially sensitive information regarding the server's build number.
CVE-2004-2582 specifically affects Novell iChain version 2.3.
Yes, CVE-2004-2582 can be exploited remotely since it involves the HTTP headers sent by the proxy server.