First published: Thu Mar 23 2006(Updated: )
The SSL server implementation in NILE.NLM in Novell NetWare 6.5 and Novell Open Enterprise Server (OES) sometimes selects a weak cipher instead of an available stronger cipher, which makes it easier for remote attackers to sniff and decrypt an SSL protected session.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Micro Focus Open Enterprise Server | ||
Novell NetWare FTP Server | =6.5-sp3 | |
Novell NetWare FTP Server | =6.5-sp1 | |
Novell NetWare FTP Server | =6.5-sp2 | |
Novell NetWare FTP Server | =6.5-sp1.1a | |
Novell NetWare FTP Server | =6.5-sp4 | |
Novell NetWare FTP Server | =6.5-sp1.1b | |
Novell NetWare FTP Server | =6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0998 has a moderate severity level due to the potential for remote attackers to sniff and decrypt SSL protected sessions.
To fix CVE-2006-0998, update your Novell NetWare or Open Enterprise Server to the latest patched version.
CVE-2006-0998 affects Novell NetWare 6.5 and Novell Open Enterprise Server (OES) on various service packs.
CVE-2006-0998 can result in the selection of weaker ciphers for SSL sessions, compromising the confidentiality of data.
Organizations using vulnerable versions of Novell NetWare or OES are at risk from potential remote attacks targeting SSL sessions.