Novell iChain 2.2 before Support Pack 1 uses a shorter timeout for a non-existent user than a valid user, which makes it easier for remote attackers to guess usernames and conduct brute force password guessing.
References
Link | Resource |
---|---|
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2966435.htm | Broken Link Patch |
Configurations
History
No history.
Information
Published : 2003-08-27 04:00
Updated : 2024-02-15 18:46
NVD link : CVE-2003-0637
Mitre link : CVE-2003-0637
CVE.ORG link : CVE-2003-0637
JSON object : View
Products Affected
novell
- ichain
CWE
CWE-203
Observable Discrepancy