|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Misc. >> Sambar Transmits Passwords in PlainText Vulnerability Assessment Details
|
Sambar Transmits Passwords in PlainText |
||
Makes sure that Sambar runs on top of SSL Detailed Explanation for this Vulnerability Assessment The remote Sambar server permits user to log in without using SSL. A possible hacker with a sniffer on the way between a user's host and this server may use this flaw to capture the password of the users of this server. With the password, he could then be able to access the webmail accounts and modify the webpages on behalf of its victim. Solution : Use Sambar on top of SSL Network Security Threat Level: Low Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Renaud Deraison |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |