First published: Wed Feb 28 2007(Updated: )
The web interface in Trend Micro ServerProtect for Linux (SPLX) 1.25, 1.3, and 2.5 before 20070216 accepts logon requests through unencrypted HTTP, which might allow remote attackers to obtain credentials by sniffing the network.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro ServerProtect for Linux | =1.25_2007-02-16 | |
Trend Micro ServerProtect for Linux | =1.25_2007-02-16-1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1169 is rated as a medium severity vulnerability due to the risk of credential exposure.
To fix CVE-2007-1169, configure the web interface of Trend Micro ServerProtect for Linux to use HTTPS instead of unencrypted HTTP.
CVE-2007-1169 affects Trend Micro ServerProtect for Linux versions 1.25, 1.3, and 2.5 before the patch released on February 16, 2007.
Attackers exploiting CVE-2007-1169 may gain access to user credentials transmitted over the network.
While CVE-2007-1169 is an older vulnerability, it remains relevant for organizations using outdated versions of Trend Micro ServerProtect for Linux.