Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2008-5188

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-21 Nov, 2008 | 02:00
Updated At-07 Aug, 2024 | 10:40
Rejected At-
Credits

The (1) ecryptfs-setup-private, (2) ecryptfs-setup-confidential, and (3) ecryptfs-setup-pam-wrapped.sh scripts in ecryptfs-utils 45 through 61 in eCryptfs place cleartext passwords on command lines, which allows local users to obtain sensitive information by listing the process.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:21 Nov, 2008 | 02:00
Updated At:07 Aug, 2024 | 10:40
Rejected At:
▼CVE Numbering Authority (CNA)

The (1) ecryptfs-setup-private, (2) ecryptfs-setup-confidential, and (3) ecryptfs-setup-pam-wrapped.sh scripts in ecryptfs-utils 45 through 61 in eCryptfs place cleartext passwords on command lines, which allows local users to obtain sensitive information by listing the process.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.openwall.com/lists/oss-security/2008/10/23/3
mailing-list
x_refsource_MLIST
http://www.openwall.com/lists/oss-security/2008/10/29/7
mailing-list
x_refsource_MLIST
https://launchpad.net/bugs/287908
x_refsource_CONFIRM
http://git.kernel.org/?p=linux/kernel/git/mhalcrow/ecryptfs-utils.git%3Ba=commit%3Bh=06de99afd53f03fe07eda0ad9d61ac6d5d4d9f53
x_refsource_CONFIRM
http://osvdb.org/50355
vdb-entry
x_refsource_OSVDB
http://www.openwall.com/lists/oss-security/2008/10/29/4
mailing-list
x_refsource_MLIST
http://secunia.com/advisories/32382
third-party-advisory
x_refsource_SECUNIA
http://osvdb.org/50354
vdb-entry
x_refsource_OSVDB
https://exchange.xforce.ibmcloud.com/vulnerabilities/46073
vdb-entry
x_refsource_XF
http://osvdb.org/49334
vdb-entry
x_refsource_OSVDB
http://rhn.redhat.com/errata/RHSA-2009-1307.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/36552
third-party-advisory
x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9607
vdb-entry
signature
x_refsource_OVAL
http://osvdb.org/50353
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.openwall.com/lists/oss-security/2008/10/23/3
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://www.openwall.com/lists/oss-security/2008/10/29/7
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://launchpad.net/bugs/287908
Resource:
x_refsource_CONFIRM
Hyperlink: http://git.kernel.org/?p=linux/kernel/git/mhalcrow/ecryptfs-utils.git%3Ba=commit%3Bh=06de99afd53f03fe07eda0ad9d61ac6d5d4d9f53
Resource:
x_refsource_CONFIRM
Hyperlink: http://osvdb.org/50355
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.openwall.com/lists/oss-security/2008/10/29/4
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://secunia.com/advisories/32382
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://osvdb.org/50354
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/46073
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://osvdb.org/49334
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://rhn.redhat.com/errata/RHSA-2009-1307.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/36552
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9607
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://osvdb.org/50353
Resource:
vdb-entry
x_refsource_OSVDB
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.openwall.com/lists/oss-security/2008/10/23/3
mailing-list
x_refsource_MLIST
x_transferred
http://www.openwall.com/lists/oss-security/2008/10/29/7
mailing-list
x_refsource_MLIST
x_transferred
https://launchpad.net/bugs/287908
x_refsource_CONFIRM
x_transferred
http://git.kernel.org/?p=linux/kernel/git/mhalcrow/ecryptfs-utils.git%3Ba=commit%3Bh=06de99afd53f03fe07eda0ad9d61ac6d5d4d9f53
x_refsource_CONFIRM
x_transferred
http://osvdb.org/50355
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.openwall.com/lists/oss-security/2008/10/29/4
mailing-list
x_refsource_MLIST
x_transferred
http://secunia.com/advisories/32382
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://osvdb.org/50354
vdb-entry
x_refsource_OSVDB
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/46073
vdb-entry
x_refsource_XF
x_transferred
http://osvdb.org/49334
vdb-entry
x_refsource_OSVDB
x_transferred
http://rhn.redhat.com/errata/RHSA-2009-1307.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/36552
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9607
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://osvdb.org/50353
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2008/10/23/3
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2008/10/29/7
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://launchpad.net/bugs/287908
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://git.kernel.org/?p=linux/kernel/git/mhalcrow/ecryptfs-utils.git%3Ba=commit%3Bh=06de99afd53f03fe07eda0ad9d61ac6d5d4d9f53
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://osvdb.org/50355
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2008/10/29/4
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://secunia.com/advisories/32382
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://osvdb.org/50354
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/46073
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://osvdb.org/49334
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2009-1307.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/36552
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9607
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://osvdb.org/50353
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:21 Nov, 2008 | 02:30
Updated At:07 Nov, 2023 | 02:03

The (1) ecryptfs-setup-private, (2) ecryptfs-setup-confidential, and (3) ecryptfs-setup-pam-wrapped.sh scripts in ecryptfs-utils 45 through 61 in eCryptfs place cleartext passwords on command lines, which allows local users to obtain sensitive information by listing the process.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.2HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 2.0
Base score: 7.2
Base severity: HIGH
Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

ecryptfs
ecryptfs
>>ecryptfs_utils>>45
cpe:2.3:a:ecryptfs:ecryptfs_utils:45:*:*:*:*:*:*:*
ecryptfs
ecryptfs
>>ecryptfs_utils>>46
cpe:2.3:a:ecryptfs:ecryptfs_utils:46:*:*:*:*:*:*:*
ecryptfs
ecryptfs
>>ecryptfs_utils>>47
cpe:2.3:a:ecryptfs:ecryptfs_utils:47:*:*:*:*:*:*:*
ecryptfs
ecryptfs
>>ecryptfs_utils>>48
cpe:2.3:a:ecryptfs:ecryptfs_utils:48:*:*:*:*:*:*:*
ecryptfs
ecryptfs
>>ecryptfs_utils>>49
cpe:2.3:a:ecryptfs:ecryptfs_utils:49:*:*:*:*:*:*:*
ecryptfs
ecryptfs
>>ecryptfs_utils>>50
cpe:2.3:a:ecryptfs:ecryptfs_utils:50:*:*:*:*:*:*:*
ecryptfs
ecryptfs
>>ecryptfs_utils>>51
cpe:2.3:a:ecryptfs:ecryptfs_utils:51:*:*:*:*:*:*:*
ecryptfs
ecryptfs
>>ecryptfs_utils>>53
cpe:2.3:a:ecryptfs:ecryptfs_utils:53:*:*:*:*:*:*:*
ecryptfs
ecryptfs
>>ecryptfs_utils>>54
cpe:2.3:a:ecryptfs:ecryptfs_utils:54:*:*:*:*:*:*:*
ecryptfs
ecryptfs
>>ecryptfs_utils>>55
cpe:2.3:a:ecryptfs:ecryptfs_utils:55:*:*:*:*:*:*:*
ecryptfs
ecryptfs
>>ecryptfs_utils>>56
cpe:2.3:a:ecryptfs:ecryptfs_utils:56:*:*:*:*:*:*:*
ecryptfs
ecryptfs
>>ecryptfs_utils>>57
cpe:2.3:a:ecryptfs:ecryptfs_utils:57:*:*:*:*:*:*:*
ecryptfs
ecryptfs
>>ecryptfs_utils>>58
cpe:2.3:a:ecryptfs:ecryptfs_utils:58:*:*:*:*:*:*:*
ecryptfs
ecryptfs
>>ecryptfs_utils>>59
cpe:2.3:a:ecryptfs:ecryptfs_utils:59:*:*:*:*:*:*:*
ecryptfs
ecryptfs
>>ecryptfs_utils>>60
cpe:2.3:a:ecryptfs:ecryptfs_utils:60:*:*:*:*:*:*:*
ecryptfs
ecryptfs
>>ecryptfs_utils>>61
cpe:2.3:a:ecryptfs:ecryptfs_utils:61:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-255Primarynvd@nist.gov
CWE ID: CWE-255
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://git.kernel.org/?p=linux/kernel/git/mhalcrow/ecryptfs-utils.git%3Ba=commit%3Bh=06de99afd53f03fe07eda0ad9d61ac6d5d4d9f53cve@mitre.org
N/A
http://osvdb.org/49334cve@mitre.org
N/A
http://osvdb.org/50353cve@mitre.org
N/A
http://osvdb.org/50354cve@mitre.org
N/A
http://osvdb.org/50355cve@mitre.org
N/A
http://rhn.redhat.com/errata/RHSA-2009-1307.htmlcve@mitre.org
N/A
http://secunia.com/advisories/32382cve@mitre.org
N/A
http://secunia.com/advisories/36552cve@mitre.org
N/A
http://www.openwall.com/lists/oss-security/2008/10/23/3cve@mitre.org
N/A
http://www.openwall.com/lists/oss-security/2008/10/29/4cve@mitre.org
N/A
http://www.openwall.com/lists/oss-security/2008/10/29/7cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/46073cve@mitre.org
N/A
https://launchpad.net/bugs/287908cve@mitre.org
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9607cve@mitre.org
N/A
Hyperlink: http://git.kernel.org/?p=linux/kernel/git/mhalcrow/ecryptfs-utils.git%3Ba=commit%3Bh=06de99afd53f03fe07eda0ad9d61ac6d5d4d9f53
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://osvdb.org/49334
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://osvdb.org/50353
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://osvdb.org/50354
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://osvdb.org/50355
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2009-1307.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/32382
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/36552
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2008/10/23/3
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2008/10/29/4
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2008/10/29/7
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/46073
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://launchpad.net/bugs/287908
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9607
Source: cve@mitre.org
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

9Records found

CVE-2009-3516
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.08% / 24.41%
||
7 Day CHG~0.00%
Published-01 Oct, 2009 | 15:00
Updated-07 Aug, 2024 | 06:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

gssd in IBM AIX 5.3.x through 5.3.9 and 6.1.0 through 6.1.2 does not properly handle the NFSv4 Kerberos credential cache, which allows local users to bypass intended access restrictions for Kerberized NFSv4 shares via unspecified vectors.

Action-Not Available
Vendor-n/aIBM Corporation
Product-aixn/a
CWE ID-CWE-255
Not Available
CVE-2009-2084
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.06% / 17.50%
||
7 Day CHG~0.00%
Published-16 Jun, 2009 | 23:00
Updated-07 Aug, 2024 | 05:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Simple Linux Utility for Resource Management (SLURM) 1.2 and 1.3 before 1.3.14 does not properly set supplementary groups before invoking (1) sbcast from the slurmd daemon or (2) strigger from the slurmctld daemon, which might allow local SLURM users to modify files and gain privileges.

Action-Not Available
Vendor-llnln/a
Product-slurmn/a
CWE ID-CWE-255
Not Available
CVE-2007-1068
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.09% / 26.58%
||
7 Day CHG~0.00%
Published-22 Feb, 2007 | 01:00
Updated-07 Aug, 2024 | 12:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The (1) TTLS CHAP, (2) TTLS MSCHAP, (3) TTLS MSCHAPv2, (4) TTLS PAP, (5) MD5, (6) GTC, (7) LEAP, (8) PEAP MSCHAPv2, (9) PEAP GTC, and (10) FAST authentication methods in Cisco Secure Services Client (CSSC) 4.x, Trust Agent 1.x and 2.x, Cisco Security Agent (CSA) 5.0 and 5.1 (when a vulnerable Trust Agent has been deployed), and the Meetinghouse AEGIS SecureConnect Client store transmitted authentication credentials in plaintext log files, which allows local users to obtain sensitive information by reading these files, aka CSCsg34423.

Action-Not Available
Vendor-meetinghousen/aCisco Systems, Inc.
Product-trust_agentsecurity_agentaegis_secureconnect_clientsecure_services_clientn/a
CWE ID-CWE-255
Not Available
CVE-2007-2766
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.05% / 16.50%
||
7 Day CHG~0.00%
Published-18 May, 2007 | 22:00
Updated-07 Aug, 2024 | 13:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

lib/backup-methods.sh in Backup Manager before 0.7.6 provides the MySQL password as a plaintext command line argument, which allows local users to obtain this password by listing the process and its arguments, related to lib/backup-methods.sh.

Action-Not Available
Vendor-backup_managern/a
Product-backup_managern/a
CWE ID-CWE-255
Not Available
CVE-2019-1950
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-8.4||HIGH
EPSS-0.36% / 57.45%
||
7 Day CHG~0.00%
Published-19 Feb, 2020 | 19:55
Updated-15 Nov, 2024 | 17:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE SD-WAN Software Default Credentials Vulnerability

A vulnerability in Cisco IOS XE SD-WAN Software could allow an unauthenticated, local attacker to gain unauthorized access to an affected device. The vulnerability is due to the existence of default credentials within the default configuration of an affected device. An attacker who has access to an affected device could log in with elevated privileges. A successful exploit could allow the attacker to take complete control of the device. This vulnerability affects Cisco devices that are running Cisco IOS XE SD-WAN Software releases 16.11 and earlier.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-nexus_56128pnexus_5696qasr_1002-hxucs-e180d-m31109-2p_integrated_services_router4331_integrated_services_routerir11014461_integrated_services_routerucs-e1120d-m3asr_1000-xasr_1004asr_1006-xnexus_5648qasr_1013ucs-e180d-m21101-4p_integrated_services_router4431_integrated_services_routerucs-e140s-m2ucs-e160d-m2nexus_5672up1100-4p_integrated_services_routerios_xe4221_integrated_services_routernexus_5624q1111x-8p_integrated_services_routerasr_10061100-8p_integrated_services_router1109-4p_integrated_services_routerucs-e160s-m3nexus_5672up-16gasr_1001-hxasr_1002-xcsr1000vasr_1009-xCisco IOS XE SD-WAN Software
CWE ID-CWE-255
Not Available
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2019-1654
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-0.21% / 42.77%
||
7 Day CHG~0.00%
Published-17 Apr, 2019 | 21:45
Updated-20 Nov, 2024 | 17:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Aironet Series Access Points Development Shell Access Vulnerability

A vulnerability in the development shell (devshell) authentication for Cisco Aironet Series Access Points (APs) running the Cisco AP-COS operating system could allow an authenticated, local attacker to access the development shell without proper authentication, which allows for root access to the underlying Linux OS. The attacker would need valid device credentials. The vulnerability exists because the software improperly validates user-supplied input at the CLI authentication prompt for development shell access. An attacker could exploit this vulnerability by authenticating to the device and entering crafted input at the CLI. A successful exploit could allow the attacker to access the AP development shell without proper authentication, which allows for root access to the underlying Linux OS. Software versions prior to 8.3.150.0, 8.5.135.0, and 8.8.100.0 are affected.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ap-cosaironet_2800aironet_1800aironet_3800aironet_1560aironet_1540Cisco Aironet Access Point Software
CWE ID-CWE-255
Not Available
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-28498
Matching Score-4
Assigner-Arista Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Arista Networks, Inc.
CVSS Score-8.7||HIGH
EPSS-0.09% / 26.43%
||
7 Day CHG~0.00%
Published-09 Sep, 2021 | 12:38
Updated-03 Aug, 2024 | 21:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Arista's MOS (Metamako Operating System) software which is supported on the 7130 product line, user enable passwords set in clear text could result in unprivileged users getting complete access to the systems. This issue affects: Arista Metamako Operating System MOS-0.13 and post releases in the MOS-0.1x train MOS-0.26.6 and prior releases in the MOS-0.2x train MOS-0.31.1 and prior releases in the MOS-0.3x train

Action-Not Available
Vendor-Arista Networks, Inc.
Product-metamako_operating_system7130Metamako Operating System
CWE ID-CWE-255
Not Available
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2008-5103
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.06% / 18.97%
||
7 Day CHG~0.00%
Published-17 Nov, 2008 | 18:00
Updated-07 Aug, 2024 | 10:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The (1) python-vm-builder and (2) ubuntu-vm-builder implementations in VMBuilder 0.9 in Ubuntu 8.10 omit the -e option when invoking chpasswd with a root:! argument, which configures the root account with a cleartext password of ! (exclamation point) and allows attackers to bypass intended login restrictions.

Action-Not Available
Vendor-dcgrendeln/aUbuntu
Product-ubuntu_linuxvmbuildern/a
CWE ID-CWE-255
Not Available
CVE-2008-5104
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.06% / 18.97%
||
7 Day CHG~0.00%
Published-17 Nov, 2008 | 18:00
Updated-07 Aug, 2024 | 10:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Ubuntu 6.06 LTS, 7.10, 8.04 LTS, and 8.10, when installed as a virtual machine by (1) python-vm-builder or (2) ubuntu-vm-builder in VMBuilder 0.9 in Ubuntu 8.10, have ! (exclamation point) as the default root password, which allows attackers to bypass intended login restrictions.

Action-Not Available
Vendor-dcgrendeln/aUbuntu
Product-ubuntu_linuxvmbuildern/a
CWE ID-CWE-255
Not Available
Details not found