First published: Tue Aug 09 2011(Updated: )
The Mobility Pack before 1.2 in Novell Data Synchronizer 1.x through 1.1.2 build 428 sends the Admin LDAP password in cleartext, which allows remote attackers to obtain sensitive information by sniffing the network.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell Mobility Pack | =1.1 | |
Novell Data Synchronizer | =1.1.2 | |
Novell Data Synchronizer | =1.1.0 | |
Novell Data Synchronizer | =1.1.1 | |
Novell Mobility Pack | =1.1.2 | |
Novell Data Synchronizer | =1.0.0 | |
Novell Mobility Pack | =1.0 | |
Novell Mobility Pack | =1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2223 is considered to have a medium severity due to the risk of sensitive information being exposed over the network.
To fix CVE-2011-2223, upgrade to Novell Data Synchronizer Mobility Pack version 1.2 or later to ensure secure transmission of passwords.
CVE-2011-2223 affects Novell Data Synchronizer versions 1.0.0, 1.1.0, 1.1.1, and 1.1.2, along with Novell Mobility Pack versions 1.0 and 1.1.
Yes, CVE-2011-2223 can potentially allow unauthorized access to sensitive information by exposing the Admin LDAP password in cleartext.
The primary impact of CVE-2011-2223 is unauthorized access to sensitive information due to the transmission of credentials in cleartext over the network.