First published: Wed Aug 08 2012(Updated: )
The SUSE Audit Log Keeper daemon before 0.2.1-0.4.6.1 for SUSE Manager and Spacewalk uses world-readable permissions for /etc/auditlog-keeper.conf, which allows local users to obtain passwords by reading this file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell Suse Audit Log Keeper | <=0.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0421 has a medium severity level as it allows local users to access sensitive configuration data.
To fix CVE-2012-0421, update the SUSE Audit Log Keeper to version 0.2.1-0.4.6.1 or later to secure the configuration file permissions.
CVE-2012-0421 affects the SUSE Audit Log Keeper daemon versions below 0.2.1-0.4.6.1.
No, CVE-2012-0421 can only be exploited by local users with access to the system.
CVE-2012-0421 is a local information disclosure vulnerability due to improper file permissions.