First published: Tue Mar 15 2005(Updated: )
Novell iChain Mini FTP Server 2.3 displays different error messages if a user exists or not, which allows remote attackers to obtain sensitive information and facilitates brute force attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell iChain | =2.2-sp1 | |
Novell iChain | =2.2-sp1a | |
Novell iChain | =2.2.113 | |
Novell iChain | =2.2 | |
Novell iChain | =2.3 | |
Novell iChain | =2.2-sp2 | |
Novell iChain | =2.2-sp3 | |
Novell iChain | =2.3-sp2 | |
Novell iChain | =2.2 | |
Novell iChain | =2.2-sp1 | |
Novell iChain | =2.2-sp1a | |
Novell iChain | =2.2-sp2 | |
Novell iChain | =2.2-sp3 | |
Novell iChain | =2.2.113 | |
Novell iChain | =2.3 | |
Novell iChain | =2.3-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0797 is considered a medium severity vulnerability due to its potential impact on information disclosure and brute force attacks.
To fix CVE-2005-0797, it is recommended to upgrade to the latest version of Novell iChain that addresses this vulnerability.
CVE-2005-0797 facilitates brute force attacks due to the varying error messages that indicate whether a user exists.
CVE-2005-0797 affects versions 2.2, 2.3, and their respective service pack releases prior to the patch.
Yes, CVE-2005-0797 can be exploited remotely, allowing attackers to gain sensitive information.