First published: Thu Jul 21 2016(Updated: )
It was found that 389 Directory Server is vulnerable to a remote password disclosure via timing attack. Due to the use of strcmp and memcmp in the verification of passwords and hashes, remote attacker is able to tell the difference between computation times which makes him able to retrieve the password after many tries. This affects systems storing passwords in plain text. Systems using unsalted hashes might be unsafe as well if using weak hash algorithms, however the attack would be very time-consuming.
Affected Software | Affected Version | How to fix |
---|---|---|
389 Directory Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1358865 is classified as a high-severity vulnerability due to its potential for unauthorized password disclosure.
To fix REDHAT-BUG-1358865, you should apply the latest patches or updates provided by Red Hat for the 389 Directory Server.
The impact of REDHAT-BUG-1358865 allows a remote attacker to exploit timing discrepancies in password verification, potentially revealing passwords.
REDHAT-BUG-1358865 affects various versions of the Red Hat 389 Directory Server, specifically those using vulnerable strcmp and memcmp functions.
REDHAT-BUG-1358865 is a remote vulnerability, allowing attackers to exploit it from outside the local network.