First published: Tue Oct 17 2006(Updated: )
Secure Computing SafeWord RemoteAccess 2.1 allows local users to obtain the UserCenter webportal password, database encryption keys, and signing keys by reading (1) base-64 encoded data in SERVERS\Web\Tomcat\usercenter\WEB-INF\login.conf and (2) plaintext data in SERVERS\Shared\signers.cfg. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Securecomputing Safeword Remoteaccess | =2.1 | |
=2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5303 is classified as a high severity vulnerability due to the exposure of sensitive data.
To fix CVE-2006-5303, it is recommended to restrict access to the configuration files and upgrade to a more secure version of the software.
CVE-2006-5303 affects users of Secure Computing SafeWord RemoteAccess version 2.1.
CVE-2006-5303 exposes user passwords, database encryption keys, and signing keys.
Yes, local users can exploit CVE-2006-5303 to obtain sensitive information from the application.