First published: Mon Dec 18 2006(Updated: )
The save_log_local function in Fully Automatic Installation (FAI) 2.10.1, and possibly 3.1.2, when verbose mode is enabled, stores the root password hash in /var/log/fai/current/fai.log, whose file permissions allow it to be copied to other hosts when fai-savelog is called and allows attackers to obtain the hash.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
thomas lange Fully automated Installation | =2.1 | |
thomas lange Fully automated Installation | =3.1.2 | |
Debian Linux | =3.1 | |
Debian Linux | =3.1 | |
Debian Linux | =3.1 | |
Debian Linux | =3.1 | |
Debian Linux | =3.1 | |
Debian Linux | =3.1 | |
Debian Linux | =3.1 | |
Debian Linux | =3.1 | |
Debian Linux | =3.1 | |
Debian Linux | =3.1 | |
Debian Linux | =3.1 | |
Debian Linux | =3.1 | |
Debian Linux | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6614 is classified as a medium severity vulnerability due to the exposure of sensitive password information.
To fix CVE-2006-6614, it is recommended to modify the logging configuration to disable verbose mode or secure the permissions on the log files.
CVE-2006-6614 affects Fully Automated Installation versions 2.10.1 and possibly 3.1.2 as well as Debian Linux 3.1.
CVE-2006-6614 can be exploited by an attacker who gains access to the log files that contain the root password hash.
CVE-2006-6614 is a recognized vulnerability primarily associated with older versions of Fully Automated Installation and Debian Linux.