First published: Thu Jan 20 2011(Updated: )
It was discovered that 389 / Red Hat Directory Server's setup scripts set insecure permissions (0777) on the /var/run/dirsrv directory used to store Directory Server's pid files when multiple Directory Server instances were configured on the system to be run under the different unprivileged users. A local user could use this flaw to create, remove or replace pid files in this directory, possibly preventing correct start of the Directory Server instances, or causing Directory Server init script to kill arbitrary process during the Directory Server shutdown.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fedoraproject 389 Directory Server | =1.2.5-rc4 | |
Fedoraproject 389 Directory Server | =1.2.3 | |
Fedoraproject 389 Directory Server | =1.2.5-rc1 | |
Fedoraproject 389 Directory Server | =1.2.6-rc3 | |
Fedoraproject 389 Directory Server | =1.2.6-a3 | |
Fedoraproject 389 Directory Server | =1.2.6-rc1 | |
Fedoraproject 389 Directory Server | =1.2.7.5 | |
Fedoraproject 389 Directory Server | =1.2.1 | |
Fedoraproject 389 Directory Server | =1.2.2 | |
Fedoraproject 389 Directory Server | =1.2.5 | |
Fedoraproject 389 Directory Server | =1.2.8-alpha2 | |
Fedoraproject 389 Directory Server | =1.2.6-rc6 | |
Fedoraproject 389 Directory Server | =1.2.6.1 | |
Fedoraproject 389 Directory Server | =1.2.5-rc3 | |
Fedoraproject 389 Directory Server | =1.2.6-a4 | |
Fedoraproject 389 Directory Server | =1.2.5-rc2 | |
Fedoraproject 389 Directory Server | =1.2.8-alpha1 | |
Fedoraproject 389 Directory Server | =1.2.6-rc2 | |
Fedoraproject 389 Directory Server | =1.2.6-a2 | |
Fedoraproject 389 Directory Server | =1.2.6 | |
Fedoraproject 389 Directory Server | =1.2.6-rc7 | |
Fedoraproject 389 Directory Server | =1.2.7-alpha3 | |
Redhat Directory Server | =8.2 | |
Redhat Directory Server | =8.2.3 | |
redhat/redhat-ds-admin | <0:8.2.1-1.el5d | 0:8.2.1-1.el5d |
redhat/redhat-ds-base | <0:8.2.4-1.el5d | 0:8.2.4-1.el5d |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.