First published: Sun Jun 01 2014(Updated: )
sosreport in Red Hat sos 1.7 and earlier on Red Hat Enterprise Linux (RHEL) 5 produces an archive with an fstab file potentially containing cleartext passwords, and lacks a warning about reviewing this archive to detect included passwords, which might allow remote attackers to obtain sensitive information by leveraging access to a technical-support data stream.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =14.04 | |
Ubuntu | =15.04 | |
Ubuntu | =15.10 | |
Red Hat sos (Supportability Tools) | <=1.7 | |
Red Hat Enterprise Linux | =5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3925 has a medium severity rating due to the potential exposure of cleartext passwords in produced archives.
To fix CVE-2014-3925, update to a newer version of Red Hat sos that is later than 1.7, or ensure sensitive information is not included in the fstab file before generating the archive.
CVE-2014-3925 affects users of Red Hat sos 1.7 and earlier on Red Hat Enterprise Linux 5 and certain versions of Ubuntu Linux.
CVE-2014-3925 exploits the lack of warning regarding cleartext passwords in the fstab file within sosreport archives.
CVE-2014-3925 is not classified as critical, but users should take precautions to protect sensitive information due to possible exposure.