First published: Tue Mar 15 2005(Updated: )
Novell iChain Mini FTP Server 2.3, and possibly earlier versions, does not limit the number of incorrect logins, which makes it easier for remote attackers to conduct brute force login attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell iChain | =2.2-sp1 | |
Novell iChain | =2.2-sp1a | |
Novell iChain | =2.2.113 | |
Novell iChain | =2.2 | |
Novell iChain | =2.3 | |
Novell iChain | =2.2-sp2 | |
Novell iChain | =2.2-sp3 | |
Novell iChain | =2.3-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0798 has a high severity level due to its potential for abuse in brute force attacks.
To fix CVE-2005-0798, implement login attempt limits and consider applying patches or updates from Novell.
CVE-2005-0798 affects Novell iChain Mini FTP Server versions 2.2 to 2.3, including all service pack releases.
CVE-2005-0798 allows remote attackers to conduct brute force login attacks due to the lack of login attempt limitations.
Check if you are using Novell iChain Mini FTP Server versions 2.2 or 2.3 to determine if CVE-2005-0798 is relevant to your environment.