Vulnerability Name: | CCN-4599 | ||||||
Published: | 2000-05-30 | ||||||
Updated: | 2000-05-30 | ||||||
Summary: | The TACACS+ authentication protocol could allow an attacker to determine the length of certain user passwords. Sequence numbers and packet types are transmitted in plaintext, allowing an attacker to identify the username and password fields being transmitted. An attacker can then determine the length of the fields from the size of the packets, because no padding is used to obscure the length of the data fields. | ||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||
CVSS v2 Severity: | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||
Vulnerability Consequences: | Bypass Security | ||||||
References: | Source: CCN Type: Openwall Security Advisory OW-001-tac_plus An Analysis of the TACACS+ Protocol and its Implementations Source: XF Type: UNKNOWN tacacsplus-padding(4599) | ||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||
BACK |