389 Directory Server 1.3.1.x, 1.3.2.x before 1.3.2.27, and 1.3.3.x before 1.3.3.9 stores "unhashed" passwords even when the nsslapd-unhashed-pw-switch option is set to off, which allows remote authenticated users to obtain sensitive information by reading the Changelog.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://directory.fedoraproject.org/docs/389ds/releases/release-1-3-2-27.html - | |
References | () http://directory.fedoraproject.org/docs/389ds/releases/release-1-3-3-9.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153991.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2015-0416.html - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1172729 - |
Information
Published : 2015-03-10 14:59
Updated : 2024-11-21 02:18
NVD link : CVE-2014-8112
Mitre link : CVE-2014-8112
CVE.ORG link : CVE-2014-8112
JSON object : View
Products Affected
fedoraproject
- 389_directory_server
- fedora
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor