CVE-2005-2403

The login protocol in RealChat 3.5.1b does not use authentication, which allows remote attackers to log on as other users by sniffing the beginning of a chat session and replaying it via a modified username.
Configurations

Configuration 1 (hide)

cpe:2.3:a:realchat:realchat:3.5.1b:*:*:*:*:*:*:*

History

20 Nov 2024, 23:59

Type Values Removed Values Added
References () http://seclists.org/lists/bugtraq/2005/Jul/0403.html - Exploit, Vendor Advisory () http://seclists.org/lists/bugtraq/2005/Jul/0403.html - Exploit, Vendor Advisory
References () http://securitytracker.com/id?1014562 - () http://securitytracker.com/id?1014562 -
References () http://www.securityfocus.com/bid/14358 - () http://www.securityfocus.com/bid/14358 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/21497 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/21497 -

Information

Published : 2005-07-27 04:00

Updated : 2024-11-20 23:59


NVD link : CVE-2005-2403

Mitre link : CVE-2005-2403

CVE.ORG link : CVE-2005-2403


JSON object : View

Products Affected

realchat

  • realchat