CVE-2005-0744
Summary
| CVE | CVE-2005-0744 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2005-05-02 04:00:00 UTC |
| Updated | 2017-07-11 01:32:00 UTC |
| Description | The web GUI for Novell iChain 2.2 and 2.3 SP2 and SP3 allows attackers to hijack sessions and gain administrator privileges by (1) sniffing the connection on TCP port 51100 and replaying the authentication information or (2) obtaining and replaying the PCZQX02 authentication cookie from the browser. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| SecurityTracker.com Archives - Novell iChain GUI Lets Remote Users Gain Administrative Access | SECTRACK | securitytracker.com | |
| Secunia - Advisories - Novell iChain Administrator Session Hijacking Vulnerability | SECUNIA | secunia.com | Patch, Vendor Advisory |
| support.novell.com/cgi-bin/search/searchtid.cgi | CONFIRM | support.novell.com | Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.