Advisory Published
Updated

CVE-2012-0435

First published: Sat Jan 26 2013(Updated: )

SUSE WebYaST before 1.2 0.2.63-0.6.1 allows remote attackers to modify the hosts list, and subsequently conduct man-in-the-middle attacks, via a crafted /host request on TCP port 4984.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Novell WebYaST Appliance=1.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2012-0435?

    CVE-2012-0435 has a high severity rating due to the potential for remote attackers to conduct man-in-the-middle attacks.

  • How do I fix CVE-2012-0435?

    To fix CVE-2012-0435, update SUSE WebYaST to version 1.2 0.2.63-0.6.1 or later.

  • What are the risks associated with CVE-2012-0435?

    The risks of CVE-2012-0435 include unauthorized modification of the hosts list and exposure to man-in-the-middle attacks.

  • Which versions of SUSE WebYaST are affected by CVE-2012-0435?

    SUSE WebYaST versions before 1.2 0.2.63-0.6.1 are affected by CVE-2012-0435.

  • How does CVE-2012-0435 impact network security?

    CVE-2012-0435 impacts network security by allowing attackers to intercept and modify communications between clients and servers.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203