Zeacom Chat Server before 5.1 uses too short a random string for the JSESSIONID value, which makes it easier for remote attackers to hijack sessions or cause a denial of service (Chat Server crash or Tomcat daemon crash) via a brute-force attack.
Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/518037/100/0/threaded | mailing list |
http://www.packetninjas.net/storage/advisories/Zeacom-CVE-2010-0217.txt | exploit |
http://securityreason.com/securityalert/8255 | third party advisory |
http://www.securityfocus.com/bid/47910 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/67540 | vdb entry |