CVE-2004-0332
CVSS10.0
发布时间 :2004-11-23 00:00:00
修订时间 :2016-10-17 22:44:02
NMCOS    

[原文]Extremail 1.5.9 does not check passwords correctly when they are all digits or begin with a digit, which allows remote attackers to gain privileges.


[CNNVD]eXtremail认证绕过漏洞(CNNVD-200411-157)

        Extremail 1.5.9没有正确检查全为数字或以数字开头的密码,远程攻击者可以利用该漏洞获取权限。

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:extremail:extremail:1.1.10
cpe:/a:extremail:extremail:1.1
cpe:/a:extremail:extremail:1.5
cpe:/a:extremail:extremail:1.0.2
cpe:/a:extremail:extremail:1.1.1
cpe:/a:extremail:extremail:1.0.1
cpe:/a:extremail:extremail:1.0
cpe:/a:extremail:extremail:1.1.5
cpe:/a:extremail:extremail:1.1.4
cpe:/a:extremail:extremail:1.1.3
cpe:/a:extremail:extremail:1.0.3
cpe:/a:extremail:extremail:1.1.2
cpe:/a:extremail:extremail:1.1.9
cpe:/a:extremail:extremail:1.5.5
cpe:/a:extremail:extremail:1.1.8
cpe:/a:extremail:extremail:1.1.7
cpe:/a:extremail:extremail:1.1.6
cpe:/a:extremail:extremail:1.5.9
cpe:/a:extremail:extremail:1.5.8

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0332
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0332
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200411-157
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=107783767517850&w=2
(UNKNOWN)  BUGTRAQ  20040226 Extremail Security Problem
http://www.securityfocus.com/bid/9754
(VENDOR_ADVISORY)  BID  9754
http://xforce.iss.net/xforce/xfdb/15329
(VENDOR_ADVISORY)  XF  extremail-password-gain-access(15329)

- 漏洞信息

eXtremail认证绕过漏洞
危急 其他
2004-11-23 00:00:00 2005-10-20 00:00:00
远程  
        Extremail 1.5.9没有正确检查全为数字或以数字开头的密码,远程攻击者可以利用该漏洞获取权限。

- 公告与补丁

        Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .

- 漏洞信息

4127
eXtremail Numeric Password User Authentication Bypass
Remote / Network Access Authentication Management
Loss of Confidentiality, Loss of Integrity
Exploit Public

- 漏洞描述

eXtremail contains a flaw that may allow a malicious user to bypass authentication. The issue is triggered when a user password consists of a single digit or begins with a digit. It is possible that the flaw may allow an attacker to log in without a password resulting in a loss of confidentiality and integrity.

- 时间线

2004-02-26 2004-02-26
Unknow Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

- 漏洞信息

eXtremail Authentication Bypass Vulnerability
Failure to Handle Exceptional Conditions 9754
Yes No
2004-02-26 12:00:00 2009-07-12 03:06:00
Discovery of this vulnerability has been credited to "Andrey Smirnov" <smirnov@net21.ru>.

- 受影响的程序版本

eXtremail eXtremail 1.5.9
eXtremail eXtremail 1.5 -8
eXtremail eXtremail 1.5 -5
eXtremail eXtremail 1.5
eXtremail eXtremail 1.1.10
eXtremail eXtremail 1.1.9
eXtremail eXtremail 1.1.8
eXtremail eXtremail 1.1.7
eXtremail eXtremail 1.1.6
eXtremail eXtremail 1.1.5
eXtremail eXtremail 1.1.4
eXtremail eXtremail 1.1.3
eXtremail eXtremail 1.1.2
eXtremail eXtremail 1.1.1
eXtremail eXtremail 1.1
eXtremail eXtremail 1.0.3
eXtremail eXtremail 1.0.2
eXtremail eXtremail 1.0.1
eXtremail eXtremail 1.0

- 漏洞讨论

eXtremail has been reported prone to an authentication bypass vulnerability. The issue will only present itself under certain circumstances. Specifically, if an account is created and the password associated with that account consists of a single digit, or the password begins with a digit, then an attacker may use this account to access the service without supplying any password.

- 漏洞利用

There is no exploit required.

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站