Castelle FaxPress, possibly 6.3 and other versions, when configured to use the Network print queue, allows attackers to obtain the username and password by submitting an incorrect login, which causes Faxpress to leak the correct username and password in plaintext in an error event.
References
Link | Resource |
---|---|
http://online.securityfocus.com/archive/1/254168 | Patch Vendor Advisory |
http://www.iss.net/security_center/static/8086.php | Vendor Advisory |
http://www.securityfocus.com/bid/4030 | Vendor Advisory |
http://online.securityfocus.com/archive/1/254168 | Patch Vendor Advisory |
http://www.iss.net/security_center/static/8086.php | Vendor Advisory |
http://www.securityfocus.com/bid/4030 | Vendor Advisory |
Configurations
History
20 Nov 2024, 23:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://online.securityfocus.com/archive/1/254168 - Patch, Vendor Advisory | |
References | () http://www.iss.net/security_center/static/8086.php - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/4030 - Vendor Advisory |
Information
Published : 2002-05-29 04:00
Updated : 2024-11-20 23:38
NVD link : CVE-2002-0235
Mitre link : CVE-2002-0235
CVE.ORG link : CVE-2002-0235
JSON object : View
Products Affected
castelle
- faxpress
CWE