CVE-2010-2450

The keygen.sh script in Shibboleth SP 2.0 (located in /usr/local/etc/shibboleth by default) uses OpenSSL to create a DES private key which is placed in sp-key.pm. It relies on the root umask (default 22) instead of chmoding the resulting file itself, so the generated private key is world readable by default.
Configurations

Configuration 1 (hide)

cpe:2.3:a:shibboleth:service_provider:2.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:16

Type Values Removed Values Added
References () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=571631 - Mailing List, Patch, Third Party Advisory () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=571631 - Mailing List, Patch, Third Party Advisory
References () https://security-tracker.debian.org/tracker/CVE-2010-2450 - Third Party Advisory () https://security-tracker.debian.org/tracker/CVE-2010-2450 - Third Party Advisory
References () https://todos.internet2.edu/browse/SSPCPP-106 - Third Party Advisory () https://todos.internet2.edu/browse/SSPCPP-106 - Third Party Advisory

Information

Published : 2019-11-07 21:15

Updated : 2024-11-21 01:16


NVD link : CVE-2010-2450

Mitre link : CVE-2010-2450

CVE.ORG link : CVE-2010-2450


JSON object : View

Products Affected

debian

  • debian_linux

shibboleth

  • service_provider
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-916

Use of Password Hash With Insufficient Computational Effort