First published: Tue Mar 31 2009(Updated: )
nss-ldapd before 0.6.8 uses world-readable permissions for the /etc/nss-ldapd.conf file, which allows local users to obtain a cleartext password for the LDAP server by reading the bindpw field.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PADL nss_ldap | <0.6.8 | |
Debian Debian Linux | =5.0 | |
PADL nss_ldap | <=0.6.7 | |
PADL nss_ldap | =0.1 | |
PADL nss_ldap | =0.2 | |
PADL nss_ldap | =0.2.1 | |
PADL nss_ldap | =0.3 | |
PADL nss_ldap | =0.4 | |
PADL nss_ldap | =0.4.1 | |
PADL nss_ldap | =0.5 | |
PADL nss_ldap | =0.6 | |
PADL nss_ldap | =0.6.1 | |
PADL nss_ldap | =0.6.2 | |
PADL nss_ldap | =0.6.3 | |
PADL nss_ldap | =0.6.4 | |
PADL nss_ldap | =0.6.5 | |
PADL nss_ldap | =0.6.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1073 is considered a moderate severity vulnerability due to improper file permissions that could allow local users to access sensitive information.
To fix CVE-2009-1073, update nss-ldapd to version 0.6.8 or later, which addresses the permissions issue.
The risks associated with CVE-2009-1073 include unauthorized access to cleartext passwords of the LDAP server, potentially leading to further system compromises.
Versions of nss-ldapd prior to 0.6.8 are affected by CVE-2009-1073.
You can verify if your system is vulnerable to CVE-2009-1073 by checking the permissions of the /etc/nss-ldapd.conf file and confirming the version of nss-ldapd installed.