Vulnerability Description
The Teiid Java Database Connectivity (JDBC) socket, as used in JBoss Enterprise Data Services Platform before 5.3.0, does not encrypt login messages by default contrary to documentation and specification, which allows remote attackers to obtain login credentials via a man-in-the-middle (MITM) attack.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Jboss Enterprise Data Services Platform | <= 5.2.0 |
Related Weaknesses (CWE)
References
- http://rhn.redhat.com/errata/RHSA-2012-1301.htmlVendor Advisory
- http://www.securityfocus.com/bid/55634
- https://bugzilla.redhat.com/show_bug.cgi?id=843669
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78803
- http://rhn.redhat.com/errata/RHSA-2012-1301.htmlVendor Advisory
- http://www.securityfocus.com/bid/55634
- https://bugzilla.redhat.com/show_bug.cgi?id=843669
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78803
FAQ
What is CVE-2012-3431?
CVE-2012-3431 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The Teiid Java Database Connectivity (JDBC) socket, as used in JBoss Enterprise Data Services Platform before 5.3.0, does not encrypt login messages by default contrary to documentation and specificat...
How severe is CVE-2012-3431?
CVE-2012-3431 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-3431?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Jboss Enterprise Data Services Platform.