First published: Thu Feb 14 2019(Updated: )
A flaw has been found in 389-ds-base versions 1.4.x.x before 1.4.1.3. When executed in verbose mode, the dscreate and dsconf commands may display sensitive information, such as the Directory Manager password. An attacker, able to see the screen or record the terminal standard error output, could use this flaw to gain sensitive information.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/389-ds-base | <1.4.1.3 | 1.4.1.3 |
Fedoraproject 389 Directory Server | >=1.4.0.0<1.4.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10224 is a vulnerability found in 389-ds-base versions 1.4.x.x before 1.4.1.3, which may display sensitive information in verbose mode.
CVE-2019-10224 has a severity rating of 4.6 (medium).
An attacker who can see the screen or record the terminal standard error output could exploit CVE-2019-10224 to gain sensitive information.
The affected software is 389-ds-base versions 1.4.x.x before 1.4.1.3, as well as FedoraProject 389 Directory Server versions between 1.4.0.0 and 1.4.1.3.
To fix CVE-2019-10224, update your 389-ds-base package to version 1.4.1.3 or later.