First published: Fri May 23 2014(Updated: )
The Gentoo Nullmailer package before 1.11-r2 uses world-readable permissions for /etc/nullmailer/remotes, which allows local users to obtain SMTP authentication credentials by reading the file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gentoo Nullmailer | =1.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4223 has a medium severity rating due to the potential for local users to gain access to sensitive SMTP authentication credentials.
To fix CVE-2013-4223, update the Nullmailer package to version 1.11-r2 or later to ensure secure file permissions.
CVE-2013-4223 affects versions of Nullmailer prior to 1.11-r2.
CVE-2013-4223 exploits the world-readable permissions set on the /etc/nullmailer/remotes file, allowing unauthorized access to SMTP credentials.
Local users on systems running vulnerable versions of Nullmailer can be impacted by CVE-2013-4223 by accessing sensitive information.