CVE Vulnerabilities

CVE-2019-10224

Insufficiently Protected Credentials

Published: Nov 25, 2019 | Modified: Nov 21, 2024
CVSS 3.x
4.6
MEDIUM
Source:
NVD
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
4.3 LOW
CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Ubuntu
LOW

A flaw has been found in 389-ds-base versions 1.4.x.x before 1.4.1.3. When executed in verbose mode, the dscreate and dsconf commands may display sensitive information, such as the Directory Manager password. An attacker, able to see the screen or record the terminal standard error output, could use this flaw to gain sensitive information.

Weakness

The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.

Affected Software

Name Vendor Start Version End Version
389_directory_server Fedoraproject 1.4.0.0 (including) 1.4.1.3 (excluding)
Red Hat Enterprise Linux 8 RedHat 389-ds:1.4-8010020190903200205.eb48df33 *
389-ds-base Ubuntu bionic *
389-ds-base Ubuntu disco *
389-ds-base Ubuntu esm-apps/bionic *
389-ds-base Ubuntu esm-apps/xenial *
389-ds-base Ubuntu trusty *
389-ds-base Ubuntu upstream *
389-ds-base Ubuntu xenial *
Python-lib389 Ubuntu trusty *

Potential Mitigations

References