CVE-2007-4961

7.5 HIGH
Published: September 18, 2007 Modified: April 23, 2026
View on NVD

Description

The login_to_simulator method in Linden Lab Second Life, as used by the secondlife:// protocol handler and possibly other Second Life login mechanisms, sends an MD5 hash in cleartext in the passwd field, which allows remote attackers to login to an account by sniffing the network and then sending this hash to a Second Life authentication server.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://osvdb.org/45947
Source: cve@mitre.org
Broken Link
http://osvdb.org/45947
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.gnucitizen.org/blog/ie-pwns-secondlife
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit

4 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.5 / 10.0
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

lindenlab