First published: Fri Dec 05 2008(Updated: )
The ClearQuest Maintenance Tool in IBM Rational ClearQuest before 7 stores the database password in cleartext in an object in a ClearQuest connection profile or export file, which allows remote authenticated users to obtain sensitive information by locating the password object within the object tree during an import process.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Rational ClearQuest | =7.0.1.1 | |
IBM Rational ClearQuest | =7.0.0.1 | |
IBM Rational ClearQuest | =7.0.0.2 | |
IBM Rational ClearQuest | =7.0.0.0 | |
IBM Rational ClearQuest | =7.0.1 | |
IBM Rational ClearQuest | <=7.0.0.3 | |
IBM Rational ClearQuest | =7.0.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5328 is classified as a moderate severity vulnerability due to its exposure of sensitive data.
To mitigate CVE-2008-5328, upgrade to a version of IBM Rational ClearQuest that no longer stores database passwords in cleartext.
CVE-2008-5328 affects IBM Rational ClearQuest versions up to 7.0.1.2.
CVE-2008-5328 compromises sensitive database passwords stored in cleartext.
CVE-2008-5328 can be exploited by remote authenticated users with access to the ClearQuest connection profile or export file.