UBUNTU-CVE-2018-10871

Source
https://ubuntu.com/security/CVE-2018-10871
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-10871.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2018-10871
Related
Published
2018-07-18T13:29:00Z
Modified
2024-10-15T14:06:25Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

389-ds-base before versions 1.3.8.5, 1.4.0.12 is vulnerable to a Cleartext Storage of Sensitive Information. By default, when the Replica and/or retroChangeLog plugins are enabled, 389-ds-base stores passwords in plaintext format in their respective changelog files. An attacker with sufficiently high privileges, such as root or Directory Manager, can query these files in order to retrieve plaintext passwords.

References

Affected packages

Ubuntu:Pro:16.04:LTS / 389-ds-base

Package

Name
389-ds-base
Purl
pkg:deb/ubuntu/389-ds-base?arch=src?distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.3.3.12-1build1
1.3.3.13-1
1.3.4.5-2
1.3.4.8-1
1.3.4.8-3
1.3.4.8-3ubuntu1
1.3.4.8-4
1.3.4.9-1
1.3.4.9-1ubuntu0.1~esm1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:18.04:LTS / 389-ds-base

Package

Name
389-ds-base
Purl
pkg:deb/ubuntu/389-ds-base?arch=src?distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.3.7.5-1
1.3.7.5-1build1
1.3.7.5-1build2
1.3.7.9-1
1.3.7.10-1
1.3.7.10-1ubuntu1
1.3.7.10-1ubuntu1+esm1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}