First published: Wed Dec 10 2014(Updated: )
Ludwig Krispenz from Red Hat reported that there is a configuration switch to prevent writing unhashed passwords into the changelogs. Unfortunately if the switch is turned on the attribute unhashed#user#password is not written to the changelog, but the hashing of the attribute value itself is also bypassed. Versions affected are 389 versions 1.3.1 and later, this means RHEL7.0 and later and Fedora20 and later. The severity seems to be limited, since: - the option is not widely known and advertised and only available in a recent version - the access to the userpassword attribute is usually protected by acis not to be readable Statement: This issue did not affect the versions of 389-ds-base as shipped with Red Hat Enterprise Linux 6.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat 389 Directory Server | >=1.3.1 | |
Red Hat Directory Server | <6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1172729 is categorized as moderate.
To fix REDHAT-BUG-1172729, ensure that the configuration switch for writing unhashed passwords in changelogs is set appropriately.
REDHAT-BUG-1172729 affects Red Hat 389 versions from 1.3.1 onward.
The impact of REDHAT-BUG-1172729 is that it may lead to unhashed passwords being exposed if the configuration switch is misconfigured.
Yes, Red Hat Directory Server versions prior to 6 are impacted by REDHAT-BUG-1172729.