The login protocol in RealChat 3.5.1b does not use authentication, which allows remote attackers to log on as other users by sniffing the beginning of a chat session and replaying it via a modified username.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/14358 | vdb entry |
http://seclists.org/lists/bugtraq/2005/Jul/0403.html | vendor advisory mailing list exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/21497 | vdb entry |
http://securitytracker.com/id?1014562 | vdb entry |