Описание
389 Directory Server in Red Hat Enterprise Linux Desktop 6 through 7, Red Hat Enterprise Linux HPC Node 6 through 7, Red Hat Enterprise Linux Server 6 through 7, and Red Hat Enterprise Linux Workstation 6 through 7 allows remote attackers to obtain user passwords.
It was found that 389 Directory Server was vulnerable to a remote password disclosure via timing attack. A remote attacker could possibly use this flaw to retrieve directory server password after many tries.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Directory Server 8 | redhat-ds-base | Will not fix | ||
Red Hat Enterprise Linux 6 | 389-ds-base | Fixed | RHSA-2016:2765 | 15.11.2016 |
Red Hat Enterprise Linux 7 | 389-ds-base | Fixed | RHSA-2016:2594 | 03.11.2016 |
Показывать по
Дополнительная информация
Статус:
6.8 Medium
CVSS3
2.6 Low
CVSS2
Связанные уязвимости
389 Directory Server in Red Hat Enterprise Linux Desktop 6 through 7, Red Hat Enterprise Linux HPC Node 6 through 7, Red Hat Enterprise Linux Server 6 through 7, and Red Hat Enterprise Linux Workstation 6 through 7 allows remote attackers to obtain user passwords.
389 Directory Server in Red Hat Enterprise Linux Desktop 6 through 7, Red Hat Enterprise Linux HPC Node 6 through 7, Red Hat Enterprise Linux Server 6 through 7, and Red Hat Enterprise Linux Workstation 6 through 7 allows remote attackers to obtain user passwords.
389 Directory Server in Red Hat Enterprise Linux Desktop 6 through 7, ...
389 Directory Server in Red Hat Enterprise Linux Desktop 6 through 7, Red Hat Enterprise Linux HPC Node 6 through 7, Red Hat Enterprise Linux Server 6 through 7, and Red Hat Enterprise Linux Workstation 6 through 7 allows remote attackers to obtain user passwords.
ELSA-2016-2765: 389-ds-base security, bug fix, and enhancement update (MODERATE)
6.8 Medium
CVSS3
2.6 Low
CVSS2