CVE-2001-1106

Sambar Server <5 - Info Disclosure

Title source: llm
STIX 2.1

Description

The default configuration of Sambar Server 5 and earlier uses a symmetric key that is compiled into the binary program for encrypting passwords, which could allow local users to break all user passwords by cracking the key or modifying a copy of the sambar program to call the decryption procedure.

Exploits (1)

exploitdb WRITEUP VERIFIED
by 3APA3A · textremotemultiple
https://www.exploit-db.com/exploits/21027

References (3)

Core 3
Core References
Exploit, Patch, Vendor Advisory vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/3095
Vendor Advisory mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/199418
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/6909

Scores

EPSS 0.0307
EPSS Percentile 86.8%

Details

Status published
Products (5)
sambar/sambar_server 4.1
sambar/sambar_server 4.2.1_production
sambar/sambar_server 4.3
sambar/sambar_server 4.4
sambar/sambar_server 5.0 beta1 (5 CPE variants)
Published Jul 25, 2001
Tracked Since Feb 18, 2026