389-ds-base における情報漏えいに関する脆弱性
| Title |
389-ds-base における情報漏えいに関する脆弱性
|
| Summary |
389-ds-base には、情報漏えいに関する脆弱性が存在します。
|
| Possible impacts |
情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution |
ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date |
June 18, 2018, midnight |
| Registration Date |
Oct. 11, 2018, 4:49 p.m. |
| Last Update |
Oct. 11, 2018, 4:49 p.m. |
|
CVSS3.0 : 重要
|
| Score |
7.2
|
| Vector |
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
|
CVSS2.0 : 警告
|
| Score |
4
|
| Vector |
AV:N/AC:L/Au:S/C:P/I:N/A:N |
Affected System
| Debian |
|
Debian GNU/Linux
|
| Fedora Project |
|
389 Directory Server
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
| No |
Changed Details |
Date of change |
| 1 |
[2018年10月11日] 掲載 |
Oct. 11, 2018, 4:49 p.m. |
NVD Vulnerability Information
CVE-2018-10871
| Summary |
389-ds-base before versions 1.3.8.5, 1.4.0.12 is vulnerable to a Cleartext Storage of Sensitive Information. By default, when the Replica and/or retroChangeLog plugins are enabled, 389-ds-base stores passwords in plaintext format in their respective changelog files. An attacker with sufficiently high privileges, such as root or Directory Manager, can query these files in order to retrieve plaintext passwords.
|
| Publication Date |
July 18, 2018, 10:29 p.m. |
| Registration Date |
March 1, 2021, 6:44 p.m. |
| Last Update |
Nov. 21, 2024, 12:42 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:* |
1.4.0.0 |
|
|
1.4.0.12 |
| cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:* |
|
|
|
1.3.8.5 |
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List