First published: Sun Mar 13 2005(Updated: )
The web GUI for Novell iChain 2.2 and 2.3 SP2 and SP3 allows attackers to hijack sessions and gain administrator privileges by (1) sniffing the connection on TCP port 51100 and replaying the authentication information or (2) obtaining and replaying the PCZQX02 authentication cookie from the browser.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell iChain | =2.2 | |
Novell iChain | =2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0744 is considered critical due to the potential for attackers to hijack sessions and gain administrator privileges.
To fix CVE-2005-0744, upgrade to a newer version of Novell iChain where this vulnerability has been addressed.
Attackers can exploit CVE-2005-0744 by sniffing traffic on TCP port 51100 or by replaying a specific authentication cookie.
CVE-2005-0744 affects Novell iChain versions 2.2 and 2.3 SP2 and SP3.
Failing to address CVE-2005-0744 may lead to unauthorized access, session hijacking, and potentially full control of the iChain system.