ID CVE-2012-3431
Summary The Teiid Java Database Connectivity (JDBC) socket, as used in JBoss Enterprise Data Services Platform before 5.3.0, does not encrypt login messages by default contrary to documentation and specification, which allows remote attackers to obtain login credentials via a man-in-the-middle (MITM) attack.
References
Vulnerable Configurations
  • cpe:2.3:a:redhat:jboss_enterprise_data_services_platform:5.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:jboss_enterprise_data_services_platform:5.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:jboss_enterprise_data_services_platform:5.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:jboss_enterprise_data_services_platform:5.2.0:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 29-08-2017 - 01:31)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:N/A:N
redhat via4
advisories
rhsa
id RHSA-2012:1301
refmap via4
bid 55634
misc https://bugzilla.redhat.com/show_bug.cgi?id=843669
xf teiid-jdbc-info-disc(78803)
Last major update 29-08-2017 - 01:31
Published 23-11-2012 - 20:55
Last modified 29-08-2017 - 01:31
Back to Top