CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register   Reset Password   Activate Account
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Vulnerability Details : CVE-1999-0502

A Unix account has a default, null, blank, or missing password.
Publish Date : 1998-03-01 Last Update Date : 2008-09-09
Search Twitter   Search YouTube   Search Google

- CVSS Scores & Vulnerability Types

CVSS Score
7.5
Confidentiality Impact Partial (There is considerable informational disclosure.)
Integrity Impact Partial (Modification of some system files or information is possible, but the attacker does not have control over what can be modified, or the scope of what the attacker can affect is limited.)
Availability Impact Partial (There is reduced performance or interruptions in resource availability.)
Access Complexity Low (Specialized access conditions or extenuating circumstances do not exist. Very little knowledge or skill is required to exploit. )
Authentication Not required (Authentication is not required to exploit the vulnerability.)
Gained Access None
Vulnerability Type(s)
CWE ID CWE id is not defined for this vulnerability

- Products Affected By CVE-1999-0502

# Product Type Vendor Product Version Update Edition Language
1 OS HP Hp-ux 10.20 Version Details Vulnerabilities
2 OS HP Hp-ux 11 Version Details Vulnerabilities
3 OS Redhat Linux 6.0 Version Details Vulnerabilities
4 OS SUN Solaris 2.5.1 Version Details Vulnerabilities
5 OS SUN Solaris 2.6 Version Details Vulnerabilities
6 OS SUN Solaris 7.0 Version Details Vulnerabilities
7 OS SUN Solaris 8.0 Version Details Vulnerabilities

- Number Of Affected Versions By Product

Vendor Product Vulnerable Versions
HP Hp-ux 2
Redhat Linux 1
SUN Solaris 4

- References For CVE-1999-0502

No references found

- Metasploit Modules Related To CVE-1999-0502

SSH User Code Execution
This module connects to the target system and executes the necessary commands to run the specified payload via SSH. If a native payload is specified, an appropriate stager will be used.
Module type : exploit Rank : manual Platforms : Linux,OSX,Python
DB2 Authentication Brute Force Utility
This module attempts to authenticate against a DB2 instance using username and password combinations indicated by the USER_FILE, PASS_FILE, and USERPASS_FILE options.
Module type : auxiliary Rank : normal
FTP Authentication Scanner
This module will test FTP logins on a range of machines and report successful logins. If you have loaded a database plugin and connected to a database this module will record successful logins and hosts so you can track your access.
Module type : auxiliary Rank : normal
Dell iDRAC Default Login
This module attempts to login to a iDRAC webserver instance using default username and password. Tested against Dell Remote Access Controller 6 - Express version 1.50 and 1.85
Module type : auxiliary Rank : normal
D-Link DIR-300A / DIR-320 / DIR-615D HTTP Login Utility
This module attempts to authenticate to different D-Link HTTP management services. It has been tested on D-Link DIR-300 Hardware revision A, D-Link DIR-615 Hardware revision D and D-Link DIR-320 devices. It is possible that this module also works with other models.
Module type : auxiliary Rank : normal
D-Link DIR-615H HTTP Login Utility
This module attempts to authenticate to different D-Link HTTP management services. It has been tested successfully on D-Link DIR-615 Hardware revision H devices. It is possible that this module also works with other models.
Module type : auxiliary Rank : normal
D-Link DIR-300B / DIR-600B / DIR-815 / DIR-645 HTTP Login Utility
This module attempts to authenticate to different D-Link HTTP management services. It has been tested successfully on D-Link DIR-300 Hardware revision B, D-Link DIR-600 Hardware revision B, D-Link DIR-815 Hardware revision A and DIR-645 Hardware revision A devices.It is possible that this module also works with other models.
Module type : auxiliary Rank : normal
HTTP Login Utility
This module attempts to authenticate to an HTTP service.
Module type : auxiliary Rank : normal
Joomla Bruteforce Login Utility
This module attempts to authenticate to Joomla 2.5. or 3.0 through bruteforce attacks
Module type : auxiliary Rank : normal
Tomcat Application Manager Login Utility
This module simply attempts to login to a Tomcat Application Manager instance using a specific user/pass.
Module type : auxiliary Rank : normal
Wordpress XML-RPC Username/Password Login Scanner
This module attempts to authenticate against a Wordpress-site (via XMLRPC) using username and password combinations indicated by the USER_FILE, PASS_FILE, and USERPASS_FILE options.
Module type : auxiliary Rank : normal
MySQL Login Utility
This module simply queries the MySQL instance for a specific user/pass (default is root with blank).
Module type : auxiliary Rank : normal
Oracle RDBMS Login Utility
This module attempts to authenticate against an Oracle RDBMS instance using username and password combinations indicated by the USER_FILE, PASS_FILE, and USERPASS_FILE options.
Module type : auxiliary Rank : normal
PcAnywhere Login Scanner
This module will test pcAnywhere logins on a range of machines and report successful logins.
Module type : auxiliary Rank : normal
PostgreSQL Login Utility
This module attempts to authenticate against a PostgreSQL instance using username and password combinations indicated by the USER_FILE, PASS_FILE, and USERPASS_FILE options. Note that passwords may be either plaintext or MD5 formatted hashes.
Module type : auxiliary Rank : normal
rexec Authentication Scanner
This module will test an rexec service on a range of machines and report successful logins. NOTE: This module requires access to bind to privileged ports (below 1024).
Module type : auxiliary Rank : normal
rlogin Authentication Scanner
This module will test an rlogin service on a range of machines and report successful logins. NOTE: This module requires access to bind to privileged ports (below 1024).
Module type : auxiliary Rank : normal
rsh Authentication Scanner
This module will test a shell (rsh) service on a range of machines and report successful logins. NOTE: This module requires access to bind to privileged ports (below 1024).
Module type : auxiliary Rank : normal
SSH Login Check Scanner
This module will test ssh logins on a range of machines and report successful logins. If you have loaded a database plugin and connected to a database this module will record successful logins and hosts so you can track your access.
Module type : auxiliary Rank : normal
Brocade Enable Login Check Scanner
This module will test a range of Brocade network devices for a privileged logins and report successes. The device authentication mode must be set as 'aaa authentication enable default local'. Telnet authentication, e.g. 'enable telnet authentication', should not be enabled in the device configuration. This module has been tested against the following devices: ICX6450-24 SWver 07.4.00bT311, FastIron WS 624 SWver 07.2.02fT7e1
Module type : auxiliary Rank : normal
Telnet Login Check Scanner
This module will test a telnet login on a range of machines and report successful logins. If you have loaded a database plugin and connected to a database this module will record successful logins and hosts so you can track your access.
Module type : auxiliary Rank : normal
VMWare Authentication Daemon Login Scanner
This module will test vmauthd logins on a range of machines and report successful logins.
Module type : auxiliary Rank : normal
VMWare Web Login Scanner
This module attempts to authenticate to the VMWare HTTP service for VmWare Server, ESX, and ESXI
Module type : auxiliary Rank : normal
WinRM Login Utility
This module attempts to authenticate to a WinRM service. It currently works only if the remote end allows Negotiate(NTLM) authentication. Kerberos is not currently supported. Please note: in order to use this module without SSL, the 'AllowUnencrypted' winrm option must be set. Otherwise adjust the port and set the SSL options in the module as appropriate.
Module type : auxiliary Rank : normal


CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.