Vulnerabilities > CVE-2008-3671 - Cryptographic Issues vulnerability in Acronis True Image Echo Server 9.5.8072

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Acronis True Image Echo Server 9.x build 8072 on Linux does not properly encrypt backups to an FTP server, which allows remote attackers to obtain sensitive information. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

Vulnerable Configurations

Part Description Count
OS
Linux
1
Application
Acronis
1

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/68373/myreview-disclose.txt
idPACKETSTORM:68373
last seen2016-12-05
published2008-07-21
reporterJulien Thomas
sourcehttps://packetstormsecurity.com/files/68373/myreview-disclose.txt.html
titlemyreview-disclose.txt