First published: Fri Feb 10 2006(Updated: )
The make_password function in ipsclass.php in Invision Power Board (IPB) 2.1.4 uses random data generated from partially predictable seeds to create the authentication code that is sent by e-mail to a user with a lost password, which might make it easier for remote attackers to guess the code and change the password for an IPB account, possibly involving millions of requests.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Invision Power Board | =2.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0633 is classified as a medium severity vulnerability due to its potential for password guessing.
To fix CVE-2006-0633, update to a later version of Invision Power Board that addresses this vulnerability.
CVE-2006-0633 affects Invision Power Board version 2.1.4.
Attackers can exploit CVE-2006-0633 to potentially guess authentication codes sent via email for password resets.
While CVE-2006-0633 is an older vulnerability, its impact remains relevant for systems still using the affected software version.