First published: Mon Nov 05 2007(Updated: )
iSCSI Enterprise Target (iscsitarget) 0.4.15 uses weak permissions for /etc/ietd.conf, which allows local users to obtain passwords.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Linux | =4.0 | |
Debian Linux | =4.0 | |
Debian Linux | =4.0 | |
Debian Linux | =4.0 | |
Debian Linux | =4.0 | |
Debian Linux | =4.0 | |
Debian Linux | =4.0 | |
Debian Linux | =4.0 | |
Debian Linux | =4.0 | |
Debian Linux | =4.0 | |
Debian Linux | =4.0 | |
Debian Linux | =4.0 | |
Debian Linux | =4.0 | |
Gitolite | =0.4.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5827 has a moderate severity level due to weak permissions on sensitive configuration files.
To fix CVE-2007-5827, you should change the permissions of /etc/ietd.conf to restrict access to authorized users.
CVE-2007-5827 affects iSCSI Enterprise Target version 0.4.15.
Yes, local users can exploit CVE-2007-5827 to gain access to passwords stored in the improperly secured configuration file.
No, CVE-2007-5827 specifically affects Debian Linux installations running iSCSI Enterprise Target version 0.4.15.