nss-ldapd before 0.6.8 uses world-readable permissions for the /etc/nss-ldapd.conf file, which allows local users to obtain a cleartext password for the LDAP server by reading the bindpw field.
References
Configurations
History
21 Nov 2024, 01:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-ldapd/debian/libnss-ldapd.postinst?r1=795&r2=813 - Broken Link, Exploit | |
References | () http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-ldapd/man/nss-ldapd.conf.5.xml?r1=805&r2=806 - Broken Link | |
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=520476 - Mailing List, Patch | |
References | () http://ch.tudelft.nl/~arthur/nss-ldapd/news.html#20090322 - Broken Link | |
References | () http://launchpad.net/bugs/cve/2009-1073 - Third Party Advisory | |
References | () http://secunia.com/advisories/34523 - Broken Link | |
References | () http://www.debian.org/security/2009/dsa-1758 - Patch, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2009/03/23/3 - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2009/03/24/2 - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2009/03/25/3 - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2009/03/25/4 - Mailing List | |
References | () http://www.securityfocus.com/bid/34211 - Broken Link, Third Party Advisory, VDB Entry |
15 Feb 2024, 21:31
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.9
v3 : 5.5 |
First Time |
Debian debian Linux
|
|
CWE | CWE-732 | |
References | () http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-ldapd/debian/libnss-ldapd.postinst?r1=795&r2=813 - Broken Link, Exploit | |
References | () http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-ldapd/man/nss-ldapd.conf.5.xml?r1=805&r2=806 - Broken Link | |
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=520476 - Mailing List, Patch | |
References | () http://ch.tudelft.nl/~arthur/nss-ldapd/news.html#20090322 - Broken Link | |
References | () http://launchpad.net/bugs/cve/2009-1073 - Third Party Advisory | |
References | () http://secunia.com/advisories/34523 - Broken Link | |
References | () http://www.debian.org/security/2009/dsa-1758 - Patch, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2009/03/23/3 - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2009/03/24/2 - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2009/03/25/3 - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2009/03/25/4 - Mailing List | |
References | () http://www.securityfocus.com/bid/34211 - Broken Link, Third Party Advisory, VDB Entry | |
CPE | cpe:2.3:a:debian:nss-ldap:0.5:*:*:*:*:*:*:* cpe:2.3:a:debian:nss-ldap:0.1:*:*:*:*:*:*:* cpe:2.3:a:debian:nss-ldap:0.6.5:*:*:*:*:*:*:* cpe:2.3:a:debian:nss-ldap:0.6.6:*:*:*:*:*:*:* cpe:2.3:a:debian:nss-ldap:0.6:*:*:*:*:*:*:* cpe:2.3:a:debian:nss-ldap:0.6.1:*:*:*:*:*:*:* cpe:2.3:a:debian:nss-ldap:0.4.1:*:*:*:*:*:*:* cpe:2.3:a:debian:nss-ldap:0.6.4:*:*:*:*:*:*:* cpe:2.3:a:debian:nss-ldap:0.2:*:*:*:*:*:*:* cpe:2.3:a:debian:nss-ldap:0.6.3:*:*:*:*:*:*:* cpe:2.3:a:debian:nss-ldap:0.3:*:*:*:*:*:*:* cpe:2.3:a:debian:nss-ldap:0.6.2:*:*:*:*:*:*:* cpe:2.3:a:debian:nss-ldap:0.4:*:*:*:*:*:*:* |
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* |
Information
Published : 2009-03-31 18:24
Updated : 2024-11-21 01:01
NVD link : CVE-2009-1073
Mitre link : CVE-2009-1073
CVE.ORG link : CVE-2009-1073
JSON object : View
Products Affected
debian
- nss-ldap
- debian_linux
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource