nss-ldapd before 0.6.8 uses world-readable permissions for the /etc/nss-ldapd.conf file, which allows local users to obtain a cleartext password for the LDAP server by reading the bindpw field.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2009/03/25/4 | mailing list |
http://www.openwall.com/lists/oss-security/2009/03/23/3 | mailing list |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=520476 | patch mailing list |
http://www.securityfocus.com/bid/34211 | broken link third party advisory vdb entry |
http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-ldapd/debian/libnss-ldapd.postinst?r1=795&r2=813 | broken link exploit |
http://www.openwall.com/lists/oss-security/2009/03/24/2 | mailing list |
http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-ldapd/man/nss-ldapd.conf.5.xml?r1=805&r2=806 | broken link |
http://www.openwall.com/lists/oss-security/2009/03/25/3 | mailing list |
http://secunia.com/advisories/34523 | third party advisory broken link |
http://ch.tudelft.nl/~arthur/nss-ldapd/news.html#20090322 | broken link |
http://launchpad.net/bugs/cve/2009-1073 | third party advisory |
http://www.debian.org/security/2009/dsa-1758 | patch vendor advisory third party advisory |