Description
The default configuration of Sambar Server 5 and earlier uses a symmetric key that is compiled into the binary program for encrypting passwords, which could allow local users to break all user passwords by cracking the key or modifying a copy of the sambar program to call the decryption procedure.
Exploits (1)
References (3)
Core 3
Core References
Exploit, Patch, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/3095
Vendor Advisory mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/199418
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/6909
Scores
EPSS
0.0307
EPSS Percentile
86.8%
Details
Status
published
Products (5)
sambar/sambar_server
4.1
sambar/sambar_server
4.2.1_production
sambar/sambar_server
4.3
sambar/sambar_server
4.4
sambar/sambar_server
5.0 beta1 (5 CPE variants)
Published
Jul 25, 2001
Tracked Since
Feb 18, 2026