First published: Sat Mar 29 2014(Updated: )
The forgotten-password feature in forcepasswd.do in the management GUI in Symantec LiveUpdate Administrator (LUA) 2.x before 2.3.2.110 allows remote attackers to reset arbitrary passwords by providing the e-mail address associated with a user account.
Credit: secure@symantec.com
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec LiveUpdate Administrator | <=2.3.2 | |
Symantec LiveUpdate Administrator | =2.1.0 | |
Symantec LiveUpdate Administrator | =2.1.2 | |
Symantec LiveUpdate Administrator | =2.1.3 | |
Symantec LiveUpdate Administrator | =2.2.1 | |
Symantec LiveUpdate Administrator | =2.2.2 | |
Symantec LiveUpdate Administrator | =2.2.2.9 | |
Symantec LiveUpdate Administrator | =2.3.0 | |
Symantec LiveUpdate Administrator | =2.3.1 | |
<=2.3.2 | ||
=2.1.0 | ||
=2.1.2 | ||
=2.1.3 | ||
=2.2.1 | ||
=2.2.2 | ||
=2.2.2.9 | ||
=2.3.0 | ||
=2.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1644 has a medium severity rating due to its potential impact on user account security.
To fix CVE-2014-1644, upgrade Symantec LiveUpdate Administrator to version 2.3.2 or later.
CVE-2014-1644 affects Symantec LiveUpdate Administrator versions 2.x prior to 2.3.2.
Attackers can exploit CVE-2014-1644 to reset arbitrary user passwords through the forgotten-password feature.
Currently, there are no known effective workarounds for CVE-2014-1644 other than upgrading to the patched version.