Vulnerability Name: | CVE-2007-6418 (CCN-39415) | ||||||||||||||||
Assigned: | 2007-10-29 | ||||||||||||||||
Published: | 2007-10-29 | ||||||||||||||||
Updated: | 2008-11-15 | ||||||||||||||||
Summary: | The libdspam7-drv-mysql cron job in Debian GNU/Linux includes the MySQL dspam database password in a command line argument, which might allow local users to read the password by listing the process and its arguments. | ||||||||||||||||
CVSS v3 Severity: | 4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||||||||||||
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N) 1.8 Low (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N/E:H/RL:OF/RC:C)
1.8 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N/E:H/RL:OF/RC:C)
| ||||||||||||||||
Vulnerability Type: | CWE-200 | ||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||
References: | Source: CCN Type: BugTraq Mailing List, Thu Feb 21 2008 - 15:20:25 CST New dspam packages fix information disclosure Source: CCN Type: Debian Bug report logs - #448519 libdspam7-drv-mysql: CVE-2007-6418 cron job may disclose dspam database password to users Source: CONFIRM Type: UNKNOWN http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=448519 Source: MITRE Type: CNA CVE-2007-6418 Source: OSVDB Type: UNKNOWN 44138 Source: CCN Type: Debian Web site Debian -- dspam (3.6.8-5.1) Source: SECUNIA Type: UNKNOWN 29059 Source: DEBIAN Type: UNKNOWN DSA-1501 Source: DEBIAN Type: DSA-1501 dspam -- programming error Source: CCN Type: OSVDB ID: 44138 Debian GNU/Linux libdspam7-drv-mysql Cron MySQL dspam Database Password Local Disclosure Source: BID Type: UNKNOWN 27938 Source: CCN Type: BID-27938 DSPAM Debian 'libdspam7-drv-mysql' Cron Job MySQL Calls Local Information Disclosure Vulnerability Source: XF Type: UNKNOWN debian-libdspam7-password-disclosure(39415) | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |