Vulnerability CVE-2013-4114


Published: 2013-08-16

Description:
The automatic update request in Nagstamont before 0.9.10 uses a cleartext base64 format for transmission of a username and password, which allows remote attackers to obtain sensitive information by sniffing the network.

Type:

CWE-255

(Credentials Management)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Nagios -> Nagstamon 
Henri wahl -> Nagstamon 

 References:
https://bugzilla.redhat.com/show_bug.cgi?id=983673
https://bugs.gentoo.org/show_bug.cgi?id=476538
http://www.openwall.com/lists/oss-security/2013/07/11/7
http://secunia.com/advisories/54276
http://secunia.com/advisories/54072
http://nagstamon.ifw-dresden.de/docs/security/
http://lists.opensuse.org/opensuse-updates/2013-07/msg00072.html

Copyright 2024, cxsecurity.com

 

Back to Top