IBM Tivoli Federated Identity Manager (TFIM) before 6.1.1.14, 6.2.0 before 6.2.0.12, and 6.2.1 before 6.2.1.4 allows context-dependent attackers to discover (1) a cleartext LDAP Bind Password, (2) keystore passwords, (3) a cleartext Basic Authentication password from a client, or (4) a cleartext user password by leveraging a logging configuration with a log trace setting of all.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 01:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://www-01.ibm.com/support/docview.wss?uid=swg1IV26822 - | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg1IV26823 - | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg1IV26824 - | |
References | () http://www.ibm.com/support/docview.wss?uid=swg21615977 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/77695 - |
Information
Published : 2013-01-17 22:55
Updated : 2024-11-21 01:40
NVD link : CVE-2012-3310
Mitre link : CVE-2012-3310
CVE.ORG link : CVE-2012-3310
JSON object : View
Products Affected
ibm
- tivoli_federated_identity_manager
CWE
CWE-255
Credentials Management Errors