First published: Mon Sep 17 2007(Updated: )
Description of problem: When duplicity's FTP backend calls ncftp, it passws the password argument via command line. That's bad -- anyone can see that. On the other side, it's a very good practice to overwrite the password string in the address space wfter it's used, though it can still be viewed under a time-dependent race condition, that's why I am cloning this to ncftp also. Additional info: See URL for the Deban BTS entry [1] for more details. [1] <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=442840">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=442840</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/duplicity | <0.4.9 | 0.4.9 |
redhat/0.4.9 | <1. | 1. |
Duplicity | <0.4.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5201 is considered a medium severity vulnerability due to the exposure of sensitive information through command line arguments.
To remediate CVE-2007-5201, upgrade the Duplicity package to version 0.4.9 or later.
CVE-2007-5201 affects the Duplicity versions prior to 0.4.9 in pip and RedHat packaging.
CVE-2007-5201 exposes passwords via command line arguments, making them visible to unauthorized users.
While CVE-2007-5201 is an older vulnerability, it remains relevant for systems still running affected versions of Duplicity.