CVE-2013-4114
Severity CVSS v4.0:
Pending analysis
Type:
CWE-255
Credentials Management
Publication date:
16/08/2013
Last modified:
11/04/2025
Description
The automatic update request in Nagstamont before 0.9.10 uses a cleartext base64 format for transmission of a username and password, which allows remote attackers to obtain sensitive information by sniffing the network.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:henri_wahl:nagstamon:*:*:*:*:*:*:*:* | 0.9.9 (including) | |
| cpe:2.3:a:henri_wahl:nagstamon:0.5.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:henri_wahl:nagstamon:0.5.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:henri_wahl:nagstamon:0.5.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:henri_wahl:nagstamon:0.5.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:henri_wahl:nagstamon:0.5.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:henri_wahl:nagstamon:0.5.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:henri_wahl:nagstamon:0.5.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:henri_wahl:nagstamon:0.5.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:henri_wahl:nagstamon:0.5.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:henri_wahl:nagstamon:0.5.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:henri_wahl:nagstamon:0.5.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:henri_wahl:nagstamon:0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:henri_wahl:nagstamon:0.6.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:henri_wahl:nagstamon:0.6.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00072.html
- http://nagstamon.ifw-dresden.de/docs/security/
- http://secunia.com/advisories/54072
- http://secunia.com/advisories/54276
- http://www.openwall.com/lists/oss-security/2013/07/11/7
- https://bugs.gentoo.org/show_bug.cgi?id=476538
- https://bugzilla.redhat.com/show_bug.cgi?id=983673
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00072.html
- http://nagstamon.ifw-dresden.de/docs/security/
- http://secunia.com/advisories/54072
- http://secunia.com/advisories/54276
- http://www.openwall.com/lists/oss-security/2013/07/11/7
- https://bugs.gentoo.org/show_bug.cgi?id=476538
- https://bugzilla.redhat.com/show_bug.cgi?id=983673



