Описание
389 Directory Server 1.3.1.x, 1.3.2.x before 1.3.2.27, and 1.3.3.x before 1.3.3.9 stores "unhashed" passwords even when the nsslapd-unhashed-pw-switch option is set to off, which allows remote authenticated users to obtain sensitive information by reading the Changelog.
389 Directory Server 1.3.1.x, 1.3.2.x before 1.3.2.27, and 1.3.3.x before 1.3.3.9 stores "unhashed" passwords even when the nsslapd-unhashed-pw-switch option is set to off, which allows remote authenticated users to obtain sensitive information by reading the Changelog.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2014-8112
- https://access.redhat.com/errata/RHSA-2015:0416
- https://access.redhat.com/security/cve/CVE-2014-8112
- https://bugzilla.redhat.com/show_bug.cgi?id=1172729
- http://directory.fedoraproject.org/docs/389ds/releases/release-1-3-2-27.html
- http://directory.fedoraproject.org/docs/389ds/releases/release-1-3-3-9.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153991.html
- http://rhn.redhat.com/errata/RHSA-2015-0416.html
Связанные уязвимости
389 Directory Server 1.3.1.x, 1.3.2.x before 1.3.2.27, and 1.3.3.x before 1.3.3.9 stores "unhashed" passwords even when the nsslapd-unhashed-pw-switch option is set to off, which allows remote authenticated users to obtain sensitive information by reading the Changelog.
389 Directory Server 1.3.1.x, 1.3.2.x before 1.3.2.27, and 1.3.3.x before 1.3.3.9 stores "unhashed" passwords even when the nsslapd-unhashed-pw-switch option is set to off, which allows remote authenticated users to obtain sensitive information by reading the Changelog.
389 Directory Server 1.3.1.x, 1.3.2.x before 1.3.2.27, and 1.3.3.x before 1.3.3.9 stores "unhashed" passwords even when the nsslapd-unhashed-pw-switch option is set to off, which allows remote authenticated users to obtain sensitive information by reading the Changelog.
389 Directory Server 1.3.1.x, 1.3.2.x before 1.3.2.27, and 1.3.3.x bef ...
ELSA-2015-0416: 389-ds-base security, bug fix, and enhancement update (IMPORTANT)