First published: Sat Jan 26 2013(Updated: )
SUSE WebYaST before 1.2 0.2.63-0.6.1 allows remote attackers to modify the hosts list, and subsequently conduct man-in-the-middle attacks, via a crafted /host request on TCP port 4984.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell WebYaST Appliance | =1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0435 has a high severity rating due to the potential for remote attackers to conduct man-in-the-middle attacks.
To fix CVE-2012-0435, update SUSE WebYaST to version 1.2 0.2.63-0.6.1 or later.
The risks of CVE-2012-0435 include unauthorized modification of the hosts list and exposure to man-in-the-middle attacks.
SUSE WebYaST versions before 1.2 0.2.63-0.6.1 are affected by CVE-2012-0435.
CVE-2012-0435 impacts network security by allowing attackers to intercept and modify communications between clients and servers.