First published: Thu Sep 05 2013(Updated: )
Open-Xchange Server before 6.20.7 rev14, 6.22.0 before rev13, and 6.22.1 before rev14 uses the crypt and SHA-1 algorithms for password hashing, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux Openexchange Server | =6.20.7 | |
SUSE Linux Openexchange Server | =6.22.0 | |
SUSE Linux Openexchange Server | =6.22.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1649 has a medium severity rating due to its potential to expose cleartext passwords through brute-force attacks.
To fix CVE-2013-1649, update Open-Xchange Server to a version that uses stronger password hashing algorithms.
CVE-2013-1649 affects Open-Xchange Server versions 6.20.7 before rev14, 6.22.0 before rev13, and 6.22.1 before rev14.
CVE-2013-1649 enables context-dependent attackers to obtain cleartext passwords via a brute-force attack.
If you are using a version prior to the recommended updates for Open-Xchange Server, you are vulnerable to CVE-2013-1649.