| Vulnerability Name: | CCN-19082 | ||||||
| Published: | 2005-01-26 | ||||||
| Updated: | 2005-01-26 | ||||||
| Summary: | Novell iChain could allow an unauthorized user to authenticate to iChain. Under a certain configuration, a remote attacker could use a mutual authentication certificate to bypass authentication and gain unauthorized access to iChain. | ||||||
| CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||
| CVSS v2 Severity: | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||
| Vulnerability Consequences: | Bypass Security | ||||||
| References: | Source: CCN Type: Novell Technical Information Document TID10096315 Invalid user authenticates to iChain using mutual authentication certificates Source: CCN Type: BID-12378 Novell iChain Mutual Authentication Certificate Remote Authentication Bypass Vulnerability Source: XF Type: UNKNOWN ichain-mutual-auth-bypass(19082) | ||||||
| Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
| BACK | |||||||