First published: Thu Jun 23 2016(Updated: )
389 Directory Server in Red Hat Enterprise Linux Desktop 6 through 7, Red Hat Enterprise Linux HPC Node 6 through 7, Red Hat Enterprise Linux Server 6 through 7, and Red Hat Enterprise Linux Workstation 6 through 7 allows remote attackers to read the default Access Control Instructions.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =6.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5416 is considered a moderate severity vulnerability due to the potential exposure of sensitive information.
To fix CVE-2016-5416, apply the security patch provided by Red Hat for your affected version of the Directory Server.
CVE-2016-5416 affects Red Hat Enterprise Linux Desktop, HPC Node, Server, and Workstation versions 6.0 through 7.0.
Yes, CVE-2016-5416 can be exploited remotely by attackers to read the default Access Control Instructions.
CVE-2016-5416 could lead to unauthorized access to sensitive configuration data, compromising the security of the affected systems.