Pedro Lineu Orso chetcpasswd 2.3.3 does not have a rate limit for client requests, which might allow remote attackers to determine passwords via a dictionary attack.
References
Link | Resource |
---|---|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=394454 | Patch |
http://www.securityfocus.com/bid/21102 | Vendor Advisory |
http://secunia.com/advisories/22967 | Vendor Advisory |
http://marc.info/?l=bugtraq&m=116371297325564&w=2 | Mailing List |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30455 |
Configurations
Information
Published : 2006-12-21 11:28
Updated : 2017-07-28 18:29
NVD link : CVE-2006-6681
Mitre link : CVE-2006-6681
JSON object : View
CWE
CWE-399
Resource Management Errors
Products Affected
chetcpasswd
- chetcpasswd