First published: Tue Jun 05 2007(Updated: )
Symantec Reporting Server 1.0.197.0, and other versions before 1.0.224.0, as used in Symantec Client Security 3.1 and later, and Symantec AntiVirus Corporate Edition (SAV CE) 10.1 and later, displays the password hash for a user after a failed login attempt, which makes it easier for remote attackers to conduct brute force attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Client Security | =3.1 | |
Symantec Client Security | =3.1.394 | |
Symantec Client Security | =3.1.396 | |
Symantec Client Security | =3.1.400 | |
Symantec Client Security | =3.1.401 | |
Symantec Norton Antivirus with Backup | =10.0.2.2021 | |
Symantec Norton Antivirus with Backup | =10.1 | |
Symantec Norton Antivirus with Backup | =10.1.396 | |
Symantec Norton Antivirus with Backup | =10.1.400 | |
Symantec Norton Antivirus with Backup | =10.1.401 | |
Symantec Reporting Server | <=1.0.197.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3022 is considered a high severity vulnerability due to the exposure of user password hashes after failed login attempts.
To fix CVE-2007-3022, upgrade to Symantec Reporting Server version 1.0.224.0 or later.
CVE-2007-3022 affects Symantec Reporting Server, Symantec Client Security versions before 3.1, and Symantec AntiVirus Corporate Edition versions 10.1 and later.
Yes, CVE-2007-3022 can be exploited remotely by attackers to obtain password hashes.
The impact of CVE-2007-3022 is significant, as it allows attackers to potentially compromise user accounts by cracking the exposed password hashes.