First published: Thu Jan 20 2011(Updated: )
It was discovered that 389 / Red Hat Directory Server's setup scripts set insecure permissions (0777) on the /var/run/dirsrv directory used to store Directory Server's pid files when multiple Directory Server instances were configured on the system to be run under the different unprivileged users. A local user could use this flaw to create, remove or replace pid files in this directory, possibly preventing correct start of the Directory Server instances, or causing Directory Server init script to kill arbitrary process during the Directory Server shutdown.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Directory Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-671199 is considered to be moderate due to insecure permissions being set on the /var/run/dirsrv directory.
To fix REDHAT-BUG-671199, adjust the permissions of the /var/run/dirsrv directory to secure values, such as 0755 or 0700.
REDHAT-BUG-671199 affects systems running Red Hat Directory Server configured with multiple instances.
The risks associated with REDHAT-BUG-671199 include potential unauthorized access to pid files and interference with the operation of different Directory Server instances.
A known workaround for REDHAT-BUG-671199 is to manually set the permissions of the /var/run/dirsrv directory to restrict access.