CVE-2004-1852

DameWare Mini Remote Control 3.x before 3.74 and 4.x before 4.2 transmits the Blowfish encryption key in plaintext, which allows remote attackers to gain sensitive information.
References
Link Resource
http://marc.info/?l=bugtraq&m=108016344224973&w=2 Mailing List Third Party Advisory
http://secunia.com/advisories/11205 Broken Link Patch Vendor Advisory
http://securitytracker.com/id?1009557 Broken Link Third Party Advisory VDB Entry Vendor Advisory
http://www.dameware.com/support/security/bulletin.asp?ID=SB3 Product Vendor Advisory
http://www.osvdb.org/4547 Broken Link Vendor Advisory
http://www.securityfocus.com/bid/9959 Broken Link Patch Third Party Advisory VDB Entry Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/15586 Third Party Advisory VDB Entry
http://marc.info/?l=bugtraq&m=108016344224973&w=2 Mailing List Third Party Advisory
http://secunia.com/advisories/11205 Broken Link Patch Vendor Advisory
http://securitytracker.com/id?1009557 Broken Link Third Party Advisory VDB Entry Vendor Advisory
http://www.dameware.com/support/security/bulletin.asp?ID=SB3 Product Vendor Advisory
http://www.osvdb.org/4547 Broken Link Vendor Advisory
http://www.securityfocus.com/bid/9959 Broken Link Patch Third Party Advisory VDB Entry Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/15586 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:solarwinds:dameware_mini_remote_control:*:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:dameware_mini_remote_control:*:*:*:*:*:*:*:*

History

20 Nov 2024, 23:51

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=108016344224973&w=2 - Mailing List, Third Party Advisory () http://marc.info/?l=bugtraq&m=108016344224973&w=2 - Mailing List, Third Party Advisory
References () http://secunia.com/advisories/11205 - Broken Link, Patch, Vendor Advisory () http://secunia.com/advisories/11205 - Broken Link, Patch, Vendor Advisory
References () http://securitytracker.com/id?1009557 - Broken Link, Third Party Advisory, VDB Entry, Vendor Advisory () http://securitytracker.com/id?1009557 - Broken Link, Third Party Advisory, VDB Entry, Vendor Advisory
References () http://www.dameware.com/support/security/bulletin.asp?ID=SB3 - Product, Vendor Advisory () http://www.dameware.com/support/security/bulletin.asp?ID=SB3 - Product, Vendor Advisory
References () http://www.osvdb.org/4547 - Broken Link, Vendor Advisory () http://www.osvdb.org/4547 - Broken Link, Vendor Advisory
References () http://www.securityfocus.com/bid/9959 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory () http://www.securityfocus.com/bid/9959 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/15586 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/15586 - Third Party Advisory, VDB Entry

25 Jan 2024, 20:57

Type Values Removed Values Added
References (SECTRACK) http://securitytracker.com/id?1009557 - Vendor Advisory (SECTRACK) http://securitytracker.com/id?1009557 - Broken Link, Third Party Advisory, VDB Entry, Vendor Advisory
References (CONFIRM) http://www.dameware.com/support/security/bulletin.asp?ID=SB3 - Patch, Vendor Advisory (CONFIRM) http://www.dameware.com/support/security/bulletin.asp?ID=SB3 - Product, Vendor Advisory
References (BUGTRAQ) http://marc.info/?l=bugtraq&m=108016344224973&w=2 - (BUGTRAQ) http://marc.info/?l=bugtraq&m=108016344224973&w=2 - Mailing List, Third Party Advisory
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/15586 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/15586 - Third Party Advisory, VDB Entry
References (OSVDB) http://www.osvdb.org/4547 - Vendor Advisory (OSVDB) http://www.osvdb.org/4547 - Broken Link, Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/11205 - Patch, Vendor Advisory (SECUNIA) http://secunia.com/advisories/11205 - Broken Link, Patch, Vendor Advisory
References (BID) http://www.securityfocus.com/bid/9959 - Patch, Vendor Advisory (BID) http://www.securityfocus.com/bid/9959 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory
CPE cpe:2.3:a:dameware_development:mini_remote_control_server:4.0:*:*:*:*:*:*:*
cpe:2.3:a:dameware_development:mini_remote_control_server:3.73_.0.0:*:*:*:*:*:*:*
cpe:2.3:a:dameware_development:mini_remote_control_server:4.1_.0.0:*:*:*:*:*:*:*
cpe:2.3:a:dameware_development:mini_remote_control_server:3.71_.0.0:*:*:*:*:*:*:*
cpe:2.3:a:dameware_development:mini_remote_control_server:3.70_.0.0:*:*:*:*:*:*:*
cpe:2.3:a:dameware_development:mini_remote_control_server:3.72_.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:dameware_mini_remote_control:*:*:*:*:*:*:*:*
CWE NVD-CWE-Other CWE-319

Information

Published : 2004-03-23 05:00

Updated : 2024-11-20 23:51


NVD link : CVE-2004-1852

Mitre link : CVE-2004-1852

CVE.ORG link : CVE-2004-1852


JSON object : View

Products Affected

solarwinds

  • dameware_mini_remote_control
CWE
CWE-319

Cleartext Transmission of Sensitive Information