First published: Tue Jun 14 2016(Updated: )
/usr/libexec/openldap/generate-server-cert.sh in openldap-servers sets weak permissions for the TLS certificate, which allows local users to obtain the TLS certificate by leveraging a race condition between the creation of the certificate, and the chmod to protect it.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenLDAP | ||
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4984 is classified with a low severity rating, indicating that while it poses a risk, it requires specific circumstances to be exploited.
To remediate CVE-2016-4984, ensure that proper permissions are set on the TLS certificate file to prevent unauthorized access.
CVE-2016-4984 affects the OpenLDAP servers package prior to the remediation updates that enforce stronger permissions for TLS certificates.
Yes, local users can exploit CVE-2016-4984 by leveraging a race condition to access the TLS certificate due to weak permission settings.
CVE-2016-4984 involves a race condition during the certificate creation process that allows local users to access the TLS certificate insecurely.