Vulnerability Description
Novell iChain Mini FTP Server 2.3, and possibly earlier versions, does not limit the number of incorrect logins, which makes it easier for remote attackers to conduct brute force login attacks.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Novell | Ichain | 2.2 |
References
- http://marc.info/?l=bugtraq&m=111091517007681&w=2
- http://secunia.com/advisories/14607Vendor Advisory
- http://securitytracker.com/id?1013408
- http://support.novell.com/cgi-bin/search/searchtid.cgi?/10096887.htmVendor Advisory
- http://www.infobyte.com.ar/adv/ISR-05.htmlVendor Advisory
- http://www.osvdb.org/14648
- http://marc.info/?l=bugtraq&m=111091517007681&w=2
- http://secunia.com/advisories/14607Vendor Advisory
- http://securitytracker.com/id?1013408
- http://support.novell.com/cgi-bin/search/searchtid.cgi?/10096887.htmVendor Advisory
- http://www.infobyte.com.ar/adv/ISR-05.htmlVendor Advisory
- http://www.osvdb.org/14648
FAQ
What is CVE-2005-0798?
CVE-2005-0798 is a vulnerability with a CVSS score of 7.5 (HIGH). Novell iChain Mini FTP Server 2.3, and possibly earlier versions, does not limit the number of incorrect logins, which makes it easier for remote attackers to conduct brute force login attacks.
How severe is CVE-2005-0798?
CVE-2005-0798 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-0798?
Check the references section above for vendor advisories and patch information. Affected products include: Novell Ichain.