First published: Sun Mar 13 2005(Updated: )
The web GUI for Novell iChain 2.2 and 2.3 SP2 and SP3 allows attackers to hijack sessions and gain administrator privileges by (1) sniffing the connection on TCP port 51100 and replaying the authentication information or (2) obtaining and replaying the PCZQX02 authentication cookie from the browser.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell iChain | =2.2 | |
Novell iChain | =2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.