First published: Tue Aug 09 2011(Updated: )
WebAdmin in the Mobility Pack before 1.2 in Novell Data Synchronizer 1.x through 1.1.2 build 428 supports weak SSL ciphers, which makes it easier for remote attackers to obtain access via a brute-force attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell Mobility Pack | =1.1 | |
Novell Data Synchronizer | =1.1.2 | |
Novell Data Synchronizer | =1.1.0 | |
Novell Data Synchronizer | =1.1.1 | |
Novell Mobility Pack | =1.1.2 | |
Novell Data Synchronizer | =1.0.0 | |
Novell Mobility Pack | =1.0 | |
Novell Mobility Pack | =1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3013 is considered a high severity vulnerability due to weak SSL cipher support allowing brute-force attacks.
To fix CVE-2011-3013, upgrade to a version of Novell Data Synchronizer or Mobility Pack that supports stronger SSL ciphers, specifically version 1.2 or later.
CVE-2011-3013 affects Novell Mobility Pack versions 1.0 to 1.1.2 and Novell Data Synchronizer versions 1.0.0 to 1.1.2.
Yes, CVE-2011-3013 can be exploited remotely by attackers using brute-force methods to obtain access.
The impact of CVE-2011-3013 on data security is significant as it allows attackers to intercept communications due to weak encryption.