The Debian courier-authlib package before 0.71.1-2 for Courier Authentication Library creates a /run/courier/authdaemon directory with weak permissions, allowing an attacker to read user information. This may include a cleartext password in some configurations. In general, it includes the user's existence, uid and gids, home and/or Maildir directory, quota, and some type of password information (such as a hash).
References
Link | Resource |
---|---|
https://bugs.debian.org/984810 | Mailing List Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2021/04/msg00011.html | Mailing List Third Party Advisory |
https://bugs.debian.org/984810 | Mailing List Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2021/04/msg00011.html | Mailing List Third Party Advisory |
Configurations
History
21 Nov 2024, 05:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.debian.org/984810 - Mailing List, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/04/msg00011.html - Mailing List, Third Party Advisory |
Information
Published : 2021-03-15 05:15
Updated : 2024-11-21 05:59
NVD link : CVE-2021-28374
Mitre link : CVE-2021-28374
CVE.ORG link : CVE-2021-28374
JSON object : View
Products Affected
debian
- debian_linux
- courier-authlib
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource