CVE-2018-10871
Summary
| CVE | CVE-2018-10871 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-07-18 13:29:00 UTC |
| Updated | 2019-10-09 23:33:00 UTC |
| Description | 389-ds-base before versions 1.3.8.5, 1.4.0.12 is vulnerable to a Cleartext Storage of Sensitive Information. By default, when the Replica and/or retroChangeLog plugins are enabled, 389-ds-base stores passwords in plaintext format in their respective changelog files. An attacker with sufficiently high privileges, such as root or Directory Manager, can query these files in order to retrieve plaintext passwords. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Issue #49789: By default, do not manage unhashed password - 389-ds-base - Pagure.io |
CONFIRM |
pagure.io |
Issue Tracking, Third Party Advisory |
| 1591480 – (CVE-2018-10871) CVE-2018-10871 389-ds-base: replication and the Retro Changelog plugin store plaintext password by default |
CONFIRM |
bugzilla.redhat.com |
Issue Tracking, Mitigation, Third Party Advisory |
| [SECURITY] [DLA 1483-1] 389-ds-base security update |
MLIST |
lists.debian.org |
Mailing List, Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 159651 Oracle Enterprise Linux Security Update for 389-ds:1.4 (ELSA-2019-3401)