The FTP backend for Duplicity before 0.4.9 sends the password as a command line argument when calling ncftp, which might allow local users to read the password by listing the process and its arguments.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=442840 | third party advisory |
http://www.securityfocus.com/bid/27771 | vdb entry third party advisory |
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00356.html | third party advisory vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=293081 | issue tracking third party advisory |
http://secunia.com/advisories/28917 | third party advisory |
http://duplicity.nongnu.org/CHANGELOG | broken link |
http://osvdb.org/42339 | vdb entry broken link |
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00445.html | third party advisory vendor advisory |