First published: Thu Aug 05 2010(Updated: )
The loginDefaultEncrypt algorithm in loginLib in Wind River VxWorks before 6.9 does not properly support a large set of distinct possible passwords, which makes it easier for remote attackers to obtain access via a (1) telnet, (2) rlogin, or (3) FTP session.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wind River VxWorks | <=6.8 | |
Wind River VxWorks | =5 | |
Wind River VxWorks | =5.5 | |
Wind River VxWorks | =6 | |
Wind River VxWorks | =6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2967 is considered a medium severity vulnerability.
To fix CVE-2010-2967, users should upgrade to Wind River VxWorks version 6.9 or later.
CVE-2010-2967 affects Wind River VxWorks versions prior to 6.9 and all versions of 5.x.
Yes, CVE-2010-2967 allows remote attackers to gain access via telnet, rlogin, or FTP.
The impact of CVE-2010-2967 is unauthorized access to systems using affected versions of Wind River VxWorks.