First published: Fri Jul 11 2014(Updated: )
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.syncope:syncope | >=1.1.0<1.1.8 | 1.1.8 |
Apache Syncope | =1.1.0 | |
Apache Syncope | =1.1.1 | |
Apache Syncope | =1.1.2 | |
Apache Syncope | =1.1.3 | |
Apache Syncope | =1.1.4 | |
Apache Syncope | =1.1.5 | |
Apache Syncope | =1.1.6 | |
Apache Syncope | =1.1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3503 has a medium severity rating due to its potential for allowing brute force password attacks.
To fix CVE-2014-3503, upgrade Apache Syncope to version 1.1.8 or later.
CVE-2014-3503 affects Apache Syncope versions 1.1.0 through 1.1.7.
CVE-2014-3503 enables attackers to perform brute force attacks to guess passwords.
Users of Apache Syncope prior to version 1.1.8 may be at risk of unauthorized access due to weak password generation.