CVE-2007-5626

make_catalog_backup in Bacula 2.2.5, and probably earlier, sends a MySQL password as a command line argument, and sometimes transmits cleartext e-mail containing this command line, which allows context-dependent attackers to obtain the password by listing the process and its arguments, or by sniffing the network.
References
Link Resource
http://bugs.bacula.org/view.php?id=990 Permissions Required Vendor Advisory
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446809 Issue Tracking Mailing List Third Party Advisory
http://osvdb.org/41861 Broken Link
http://secunia.com/advisories/27243 Broken Link Third Party Advisory
http://secunia.com/advisories/31184 Broken Link Third Party Advisory
http://security.gentoo.org/glsa/glsa-200807-10.xml Third Party Advisory
http://www.securityfocus.com/bid/26156 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/3572 Broken Link Permissions Required Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/37336 Third Party Advisory VDB Entry
http://bugs.bacula.org/view.php?id=990 Permissions Required Vendor Advisory
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446809 Issue Tracking Mailing List Third Party Advisory
http://osvdb.org/41861 Broken Link
http://secunia.com/advisories/27243 Broken Link Third Party Advisory
http://secunia.com/advisories/31184 Broken Link Third Party Advisory
http://security.gentoo.org/glsa/glsa-200807-10.xml Third Party Advisory
http://www.securityfocus.com/bid/26156 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/3572 Broken Link Permissions Required Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/37336 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:bacula:bacula:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:38

Type Values Removed Values Added
References () http://bugs.bacula.org/view.php?id=990 - Permissions Required, Vendor Advisory () http://bugs.bacula.org/view.php?id=990 - Permissions Required, Vendor Advisory
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446809 - Mailing List, Issue Tracking, Third Party Advisory () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446809 - Issue Tracking, Mailing List, Third Party Advisory
References () http://osvdb.org/41861 - Broken Link () http://osvdb.org/41861 - Broken Link
References () http://secunia.com/advisories/27243 - Broken Link, Third Party Advisory () http://secunia.com/advisories/27243 - Broken Link, Third Party Advisory
References () http://secunia.com/advisories/31184 - Broken Link, Third Party Advisory () http://secunia.com/advisories/31184 - Broken Link, Third Party Advisory
References () http://security.gentoo.org/glsa/glsa-200807-10.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-200807-10.xml - Third Party Advisory
References () http://www.securityfocus.com/bid/26156 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/26156 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2007/3572 - Broken Link, Permissions Required, Third Party Advisory () http://www.vupen.com/english/advisories/2007/3572 - Broken Link, Permissions Required, Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/37336 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/37336 - Third Party Advisory, VDB Entry

25 Jan 2024, 21:00

Type Values Removed Values Added
CVSS v2 : 2.1
v3 : unknown
v2 : 2.1
v3 : 5.5
References (SECUNIA) http://secunia.com/advisories/31184 - Third Party Advisory (SECUNIA) http://secunia.com/advisories/31184 - Broken Link, Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/27243 - Third Party Advisory (SECUNIA) http://secunia.com/advisories/27243 - Broken Link, Third Party Advisory
References (CONFIRM) http://bugs.bacula.org/view.php?id=990 - Vendor Advisory (CONFIRM) http://bugs.bacula.org/view.php?id=990 - Permissions Required, Vendor Advisory
References (BID) http://www.securityfocus.com/bid/26156 - Third Party Advisory, VDB Entry (BID) http://www.securityfocus.com/bid/26156 - Broken Link, Third Party Advisory, VDB Entry
References (VUPEN) http://www.vupen.com/english/advisories/2007/3572 - Permissions Required, Third Party Advisory (VUPEN) http://www.vupen.com/english/advisories/2007/3572 - Broken Link, Permissions Required, Third Party Advisory
CWE CWE-310 CWE-319

Information

Published : 2007-10-23 16:46

Updated : 2024-11-21 00:38


NVD link : CVE-2007-5626

Mitre link : CVE-2007-5626

CVE.ORG link : CVE-2007-5626


JSON object : View

Products Affected

bacula

  • bacula
CWE
CWE-319

Cleartext Transmission of Sensitive Information