Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-3925

Опубликовано: 01 июн. 2014
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 5

Описание

sosreport in Red Hat sos 1.7 and earlier on Red Hat Enterprise Linux (RHEL) 5 produces an archive with an fstab file potentially containing cleartext passwords, and lacks a warning about reviewing this archive to detect included passwords, which might allow remote attackers to obtain sensitive information by leveraging access to a technical-support data stream.

РелизСтатусПримечание
devel

not-affected

esm-infra-legacy/trusty

released

3.1-1ubuntu2.2
lucid

DNE

precise

DNE

trusty

released

3.1-1ubuntu2.2
trusty/esm

released

3.1-1ubuntu2.2
upstream

released

3.2
vivid

not-affected

3.2-2
wily

not-affected

Показывать по

EPSS

Процентиль: 60%
0.00401
Низкий

5 Medium

CVSS2

Связанные уязвимости

redhat
больше 11 лет назад

sosreport in Red Hat sos 1.7 and earlier on Red Hat Enterprise Linux (RHEL) 5 produces an archive with an fstab file potentially containing cleartext passwords, and lacks a warning about reviewing this archive to detect included passwords, which might allow remote attackers to obtain sensitive information by leveraging access to a technical-support data stream.

nvd
больше 11 лет назад

sosreport in Red Hat sos 1.7 and earlier on Red Hat Enterprise Linux (RHEL) 5 produces an archive with an fstab file potentially containing cleartext passwords, and lacks a warning about reviewing this archive to detect included passwords, which might allow remote attackers to obtain sensitive information by leveraging access to a technical-support data stream.

debian
больше 11 лет назад

sosreport in Red Hat sos 1.7 and earlier on Red Hat Enterprise Linux ( ...

github
больше 3 лет назад

sosreport in Red Hat sos 1.7 and earlier on Red Hat Enterprise Linux (RHEL) 5 produces an archive with an fstab file potentially containing cleartext passwords, and lacks a warning about reviewing this archive to detect included passwords, which might allow remote attackers to obtain sensitive information by leveraging access to a technical-support data stream.

EPSS

Процентиль: 60%
0.00401
Низкий

5 Medium

CVSS2