First published: Fri Aug 20 2010(Updated: )
389 Directory Server before 1.2.7.1 (aka Red Hat Directory Server 8.2) and HP-UX Directory Server before B.08.10.03, when audit logging is enabled, logs the Directory Manager password (nsslapd-rootpw) in cleartext when changing cn=config:nsslapd-rootpw, which might allow local users to obtain sensitive information by reading the log.
Credit: hp-security-alert@hp.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/389-ds | <1.2.7.1 | 1.2.7.1 |
HP-UX Directory Server | <b.08.10.03 | |
Red Hat Directory Server | <b.08.00.02 | |
Red Hat 389 Directory Server | <1.2.7.1 | |
Red Hat Directory Server | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3282 has a medium severity level due to the potential exposure of sensitive password information.
To address CVE-2010-3282, upgrade to version 1.2.7.1 or later of the 389 Directory Server.
CVE-2010-3282 affects users of 389 Directory Server versions prior to 1.2.7.1 and HP-UX Directory Server versions prior to B.08.10.03.
CVE-2010-3282 exposes the Directory Manager password in cleartext in audit logs, posing a security risk for local users.
CVE-2010-3282 was published on September 28, 2010.