Required CVE Record Information
Description
Barracuda Spam Firewall (BSF), possibly 3.3.03.053, contains a hardcoded password for the admin account for logins from 127.0.0.1 (localhost), which allows local users to gain privileges.
References 8 Total
- secunia.com: 21258 third-party-advisory
- securityfocus.com: 19276 vdb-entry
- securityfocus.com: 20060804 Barracuda Spam Firewall: Administrator Level Remote Command Execution [ID-20060804-01] mailing-list
- securityreason.com: 1363 third-party-advisory
- exchange.xforce.ibmcloud.com: barracuda-admin-default-account(28235) vdb-entry
- osvdb.org: 29780 vdb-entry
- archives.neohapsis.com: 20060804 Barracuda Spam Firewall: Administrator Level Remote Command Execution [ID-20060804-01] mailing-list
- kb.cert.org: VU#199348 third-party-advisory
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 8 Total
- secunia.com: 21258 third-party-advisoryx_transferred
- securityfocus.com: 19276 vdb-entryx_transferred
- securityfocus.com: 20060804 Barracuda Spam Firewall: Administrator Level Remote Command Execution [ID-20060804-01] mailing-listx_transferred
- securityreason.com: 1363 third-party-advisoryx_transferred
- exchange.xforce.ibmcloud.com: barracuda-admin-default-account(28235) vdb-entryx_transferred
- osvdb.org: 29780 vdb-entryx_transferred
- archives.neohapsis.com: 20060804 Barracuda Spam Firewall: Administrator Level Remote Command Execution [ID-20060804-01] mailing-listx_transferred
- kb.cert.org: VU#199348 third-party-advisoryx_transferred