Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2009-1073
Analyzed
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-31 Mar, 2009 | 18:24
Updated At-15 Feb, 2024 | 21:31

nss-ldapd before 0.6.8 uses world-readable permissions for the /etc/nss-ldapd.conf file, which allows local users to obtain a cleartext password for the LDAP server by reading the bindpw field.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Primary2.04.9MEDIUM
AV:L/AC:L/Au:N/C:C/I:N/A:N
Type: Primary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 2.0
Base score: 4.9
Base severity: MEDIUM
Vector:
AV:L/AC:L/Au:N/C:C/I:N/A:N
CPE Matches

Debian GNU/Linux
debian
>>nss-ldap>>Versions before 0.6.8(exclusive)
cpe:2.3:a:debian:nss-ldap:*:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>5.0
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-732Primarynvd@nist.gov
CWE ID: CWE-732
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-ldapd/debian/libnss-ldapd.postinst?r1=795&r2=813cve@mitre.org
Broken Link
Exploit
http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-ldapd/man/nss-ldapd.conf.5.xml?r1=805&r2=806cve@mitre.org
Broken Link
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=520476cve@mitre.org
Mailing List
Patch
http://ch.tudelft.nl/~arthur/nss-ldapd/news.html#20090322cve@mitre.org
Broken Link
http://launchpad.net/bugs/cve/2009-1073cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/34523cve@mitre.org
Broken Link
http://www.debian.org/security/2009/dsa-1758cve@mitre.org
Patch
Third Party Advisory
http://www.openwall.com/lists/oss-security/2009/03/23/3cve@mitre.org
Mailing List
http://www.openwall.com/lists/oss-security/2009/03/24/2cve@mitre.org
Mailing List
http://www.openwall.com/lists/oss-security/2009/03/25/3cve@mitre.org
Mailing List
http://www.openwall.com/lists/oss-security/2009/03/25/4cve@mitre.org
Mailing List
http://www.securityfocus.com/bid/34211cve@mitre.org
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-ldapd/debian/libnss-ldapd.postinst?r1=795&r2=813
Source: cve@mitre.org
Resource:
Broken Link
Exploit
Hyperlink: http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-ldapd/man/nss-ldapd.conf.5.xml?r1=805&r2=806
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=520476
Source: cve@mitre.org
Resource:
Mailing List
Patch
Hyperlink: http://ch.tudelft.nl/~arthur/nss-ldapd/news.html#20090322
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://launchpad.net/bugs/cve/2009-1073
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/34523
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://www.debian.org/security/2009/dsa-1758
Source: cve@mitre.org
Resource:
Patch
Third Party Advisory
Hyperlink: http://www.openwall.com/lists/oss-security/2009/03/23/3
Source: cve@mitre.org
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2009/03/24/2
Source: cve@mitre.org
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2009/03/25/3
Source: cve@mitre.org
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2009/03/25/4
Source: cve@mitre.org
Resource:
Mailing List
Hyperlink: http://www.securityfocus.com/bid/34211
Source: cve@mitre.org
Resource:
Broken Link
Third Party Advisory
VDB Entry
Change History
0Changes found

Details not found