Vulnerability Name:
CVE-2009-1073 (CCN-49394)
Assigned:
2009-03-20
Published:
2009-03-20
Updated:
2009-04-08
Summary:
nss-ldapd before 0.6.8 uses world-readable permissions for the /etc/nss-ldapd.conf file, which allows local users to obtain a cleartext password for the LDAP server by reading the bindpw field.
CVSS v3 Severity:
4.0 Medium
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
)
Exploitability Metrics:
Attack Vector (AV):
Local
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
Low
Integrity (I):
None
Availibility (A):
None
CVSS v2 Severity:
4.9 Medium
(CVSS v2 Vector:
AV:L/AC:L/Au:N/C:C/I:N/A:N
)
3.7 Low
(Temporal CVSS v2 Vector:
AV:L/AC:L/Au:N/C:C/I:N/A:N/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Local
Access Complexity (AC):
Low
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Complete
Integrity (I):
None
Availibility (A):
None
2.1 Low
(CCN CVSS v2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
)
1.6 Low
(CCN Temporal CVSS v2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Local
Access Complexity (AC):
Low
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
None
Availibility (A):
None
Vulnerability Type:
CWE-264
Vulnerability Consequences:
Obtain Information
References:
Source: CONFIRM
Type: Exploit
http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-ldapd/debian/libnss-ldapd.postinst?r1=795&r2=813
Source: CONFIRM
Type: UNKNOWN
http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-ldapd/man/nss-ldapd.conf.5.xml?r1=805&r2=806
Source: CCN
Type: Debian Bug report logs - #520476
libnss-ldapd: /etc/nss-ldapd.conf is created world-readable, exposing bindpw
Source: CONFIRM
Type: Patch
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=520476
Source: CONFIRM
Type: UNKNOWN
http://ch.tudelft.nl/~arthur/nss-ldapd/news.html#20090322
Source: MITRE
Type: CNA
CVE-2009-1073
Source: MISC
Type: UNKNOWN
http://launchpad.net/bugs/cve/2009-1073
Source: SECUNIA
Type: UNKNOWN
34523
Source: DEBIAN
Type: Patch
DSA-1758
Source: DEBIAN
Type: DSA-1758
nss-ldapd -- insecure config file creation
Source: MLIST
Type: UNKNOWN
[oss-security] 20090323 CVE request -- ucd-snmp / net-snmp, libnss-ldapd / nss_ldap
Source: MLIST
Type: UNKNOWN
[oss-security] 20090324 Re: CVE request -- ucd-snmp / net-snmp, libnss-ldapd / nss_ldap
Source: MLIST
Type: UNKNOWN
[oss-security] 20090324 Re: CVE request -- ucd-snmp / net-snmp, libnss-ldapd / nss_ldap
Source: MLIST
Type: UNKNOWN
[oss-security] 20090324 Re: CVE request -- ucd-snmp / net-snmp, libnss-ldapd / nss_ldap
Source: CCN
Type: OSVDB ID: 53198
nss-ldapd /etc/nss-ldapd.conf LDAP Server Local Cleartext Password Disclosure
Source: CCN
Type: PADL Software Pty Ltd Web site
nss_ldab
Source: BID
Type: UNKNOWN
34211
Source: CCN
Type: BID-34211
PADL nss_ldap '/etc/nss_ldapd.conf' Local Information Disclosure Vulnerability
Source: CCN
Type: Red Hat Bugzilla Bug 491623
nss_ldap: LDAP service configuration file shipped with world readable permissions
Source: XF
Type: UNKNOWN
nssldap-credentials-information-disclosure(49394)
Vulnerable Configuration:
Configuration 1
:
cpe:/a:debian:nss-ldap:0.1:*:*:*:*:*:*:*
OR
cpe:/a:debian:nss-ldap:0.2:*:*:*:*:*:*:*
OR
cpe:/a:debian:nss-ldap:0.2.1:*:*:*:*:*:*:*
OR
cpe:/a:debian:nss-ldap:0.3:*:*:*:*:*:*:*
OR
cpe:/a:debian:nss-ldap:0.4:*:*:*:*:*:*:*
OR
cpe:/a:debian:nss-ldap:0.4.1:*:*:*:*:*:*:*
OR
cpe:/a:debian:nss-ldap:0.5:*:*:*:*:*:*:*
OR
cpe:/a:debian:nss-ldap:0.6:*:*:*:*:*:*:*
OR
cpe:/a:debian:nss-ldap:0.6.1:*:*:*:*:*:*:*
OR
cpe:/a:debian:nss-ldap:0.6.2:*:*:*:*:*:*:*
OR
cpe:/a:debian:nss-ldap:0.6.3:*:*:*:*:*:*:*
OR
cpe:/a:debian:nss-ldap:0.6.4:*:*:*:*:*:*:*
OR
cpe:/a:debian:nss-ldap:0.6.5:*:*:*:*:*:*:*
OR
cpe:/a:debian:nss-ldap:0.6.6:*:*:*:*:*:*:*
OR
cpe:/a:debian:nss-ldap:*:*:*:*:*:*:*:*
(Version <= 0.6.7)
Configuration CCN 1
:
cpe:/a:debian:nss-ldap:0.6.7:*:*:*:*:*:*:*
OR
cpe:/a:debian:nss-ldap:0.6.6:*:*:*:*:*:*:*
OR
cpe:/a:debian:nss-ldap:0.6.5:*:*:*:*:*:*:*
OR
cpe:/a:debian:nss-ldap:0.6.4:*:*:*:*:*:*:*
OR
cpe:/a:debian:nss-ldap:0.6.3:*:*:*:*:*:*:*
OR
cpe:/a:debian:nss-ldap:0.6.2:*:*:*:*:*:*:*
OR
cpe:/a:debian:nss-ldap:0.6.1:*:*:*:*:*:*:*
OR
cpe:/a:debian:nss-ldap:0.6:*:*:*:*:*:*:*
OR
cpe:/a:debian:nss-ldap:0.5:*:*:*:*:*:*:*
OR
cpe:/a:debian:nss-ldap:0.4.1:*:*:*:*:*:*:*
OR
cpe:/a:debian:nss-ldap:0.4:*:*:*:*:*:*:*
OR
cpe:/a:debian:nss-ldap:0.3:*:*:*:*:*:*:*
OR
cpe:/a:debian:nss-ldap:0.2.1:*:*:*:*:*:*:*
OR
cpe:/a:debian:nss-ldap:0.2:*:*:*:*:*:*:*
OR
cpe:/a:debian:nss-ldap:0.1:*:*:*:*:*:*:*
AND
cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*
Denotes that component is vulnerable
Oval Definitions
Definition ID
Class
Title
Last Modified
oval:org.mitre.oval:def:8018
P
DSA-1758 nss-ldapd -- insecure config file creation
2014-06-23
oval:org.mitre.oval:def:13576
P
DSA-1758-1 nss-ldapd -- insecure config file creation
2014-06-23
oval:org.debian:def:1758
V
insecure config file creation
2009-03-30
BACK
debian
nss-ldap 0.1
debian
nss-ldap 0.2
debian
nss-ldap 0.2.1
debian
nss-ldap 0.3
debian
nss-ldap 0.4
debian
nss-ldap 0.4.1
debian
nss-ldap 0.5
debian
nss-ldap 0.6
debian
nss-ldap 0.6.1
debian
nss-ldap 0.6.2
debian
nss-ldap 0.6.3
debian
nss-ldap 0.6.4
debian
nss-ldap 0.6.5
debian
nss-ldap 0.6.6
debian
nss-ldap *
debian
nss-ldap 0.6.7
debian
nss-ldap 0.6.6
debian
nss-ldap 0.6.5
debian
nss-ldap 0.6.4
debian
nss-ldap 0.6.3
debian
nss-ldap 0.6.2
debian
nss-ldap 0.6.1
debian
nss-ldap 0.6
debian
nss-ldap 0.5
debian
nss-ldap 0.4.1
debian
nss-ldap 0.4
debian
nss-ldap 0.3
debian
nss-ldap 0.2.1
debian
nss-ldap 0.2
debian
nss-ldap 0.1
debian
debian linux 5.0