First published: Fri Jul 27 2012(Updated: )
The Teiid Java Database Connectivity (JDBC) socket, as used in JBoss Enterprise Data Services Platform before 5.3.0, does not encrypt login messages by default contrary to documentation and specification, which allows remote attackers to obtain login credentials via a man-in-the-middle (MITM) attack.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Jboss Enterprise Data Services Platform | <=5.2.0 | |
Redhat Jboss Enterprise Data Services Platform | =5.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3431 is considered a high severity vulnerability due to its potential for exploitation during a man-in-the-middle attack.
To fix CVE-2012-3431, upgrade to JBoss Enterprise Data Services Platform version 5.3.0 or later, where login message encryption is implemented correctly.
CVE-2012-3431 can be exploited through man-in-the-middle attacks, allowing unauthorized access to login credentials.
CVE-2012-3431 affects JBoss Enterprise Data Services Platform versions up to and including 5.2.0 and specific versions like 5.1.0.
A potential workaround for CVE-2012-3431 is to implement external encryption mechanisms for JDBC connections until an upgrade is possible.