ESRS VE 3.0x Certificate Validation / Insufficient Randomness

Discussion in 'News Aggregator' started by Packet Storm, 30 Jun 2015.

  1. Packet Storm

    Packet Storm Guest

    Secure Remote Services (ESRS) Virtual Edition (VE) versions 3.02, 3.03, and 3.04 do not properly validate certificates. Malicious users could potentially exploit this vulnerability to spoof trusted entities by using man-in-the-middle attacks. Session cookie used by ESRS VE is generated using insufficient random values. Malicious users could potentially exploit this vulnerability to gain unauthorized access to authenticated ESRS interfaces.

    Continue reading...
     

Share This Page

Loading...