389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), after the password for a LDAP user has been changed and before the server has been reset, allows remote attackers to read the plaintext password via the unhashed#user#password attribute.
{
"binaries": [
{
"binary_version": "1.3.2.16-0ubuntu1",
"binary_name": "389-ds"
},
{
"binary_version": "1.3.2.16-0ubuntu1",
"binary_name": "389-ds-base"
},
{
"binary_version": "1.3.2.16-0ubuntu1",
"binary_name": "389-ds-base-dbg"
},
{
"binary_version": "1.3.2.16-0ubuntu1",
"binary_name": "389-ds-base-dev"
},
{
"binary_version": "1.3.2.16-0ubuntu1",
"binary_name": "389-ds-base-libs"
},
{
"binary_version": "1.3.2.16-0ubuntu1",
"binary_name": "389-ds-base-libs-dbg"
}
],
"availability": "No subscription required"
}