Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-10871

Опубликовано: 18 июн. 2018
Источник: redhat
CVSS3: 3.8
EPSS Низкий

Описание

389-ds-base before versions 1.3.8.5, 1.4.0.12 is vulnerable to a Cleartext Storage of Sensitive Information. By default, when the Replica and/or retroChangeLog plugins are enabled, 389-ds-base stores passwords in plaintext format in their respective changelog files. An attacker with sufficiently high privileges, such as root or Directory Manager, can query these files in order to retrieve plaintext passwords.

By default, when the Replica and/or retroChangeLog plugins are enabled, 389-ds-base stores passwords in plaintext format in their respective changelog files. An attacker with sufficiently high privileges, such as root or Directory Manager, can query these files in order to retrieve plaintext passwords.

Меры по смягчению последствий

On 389-ds-base 1.3.1 and above: 1- Deactivate clear password storing by default, to prevent new passwords to be logged. -> in cn=config, set nsslapd-unhashed-pw-switch attribute to 'off' or 'nolog' 2- Trim changelog to ensure currently stored passwords are removed. For Replication: -> in cn=changelog5,cn=config, reduce nsslapd-changelogmaxentries, nsslapd-changelogtrim-interval and nsslapd-changelogmaxage -> force a replication & wait for the changelogtrim-interval time -> restore previous values For RetroChangelog: -> deactivate the plugin -> restart directory server -> reactivate the plugin -> restart directory server

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6389-ds-baseWill not fix
Red Hat Enterprise Linux 7389-ds-baseWill not fix
Red Hat Enterprise Linux 8389-dsFixedRHSA-2019:340105.11.2019

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-312
https://bugzilla.redhat.com/show_bug.cgi?id=1591480389-ds-base: replication and the Retro Changelog plugin store plaintext password by default

EPSS

Процентиль: 57%
0.00357
Низкий

3.8 Low

CVSS3

Связанные уязвимости

CVSS3: 3.8
ubuntu
больше 7 лет назад

389-ds-base before versions 1.3.8.5, 1.4.0.12 is vulnerable to a Cleartext Storage of Sensitive Information. By default, when the Replica and/or retroChangeLog plugins are enabled, 389-ds-base stores passwords in plaintext format in their respective changelog files. An attacker with sufficiently high privileges, such as root or Directory Manager, can query these files in order to retrieve plaintext passwords.

CVSS3: 3.8
nvd
больше 7 лет назад

389-ds-base before versions 1.3.8.5, 1.4.0.12 is vulnerable to a Cleartext Storage of Sensitive Information. By default, when the Replica and/or retroChangeLog plugins are enabled, 389-ds-base stores passwords in plaintext format in their respective changelog files. An attacker with sufficiently high privileges, such as root or Directory Manager, can query these files in order to retrieve plaintext passwords.

CVSS3: 3.8
debian
больше 7 лет назад

389-ds-base before versions 1.3.8.5, 1.4.0.12 is vulnerable to a Clear ...

CVSS3: 7.2
github
больше 3 лет назад

389-ds-base before versions 1.3.8.5, 1.4.0.12 is vulnerable to a Cleartext Storage of Sensitive Information. By default, when the Replica and/or retroChangeLog plugins are enabled, 389-ds-base stores passwords in plaintext format in their respective changelog files. An attacker with sufficiently high privileges, such as root or Directory Manager, can query these files in order to retrieve plaintext passwords.

oracle-oval
около 6 лет назад

ELSA-2019-3401: 389-ds:1.4 security, bug fix, and enhancement update (IMPORTANT)

EPSS

Процентиль: 57%
0.00357
Низкий

3.8 Low

CVSS3