Sun Solaris LDAP Client May Disclose RootDN Password to Local Users
|
SecurityTracker Alert ID: 1015903 |
SecurityTracker URL: http://securitytracker.com/id/1015903
|
CVE Reference:
CVE-2006-1782
(Links to External Site)
|
Updated: Nov 27 2009
|
Original Entry Date: Apr 12 2006
|
Impact:
Disclosure of authentication information
|
Fix Available: Yes Vendor Confirmed: Yes
|
|
Description:
A vulnerability was reported in the Sun Solaris LDAP client. A local user may be able to obtain the rootDN password.
If a privileged user invokes the idsconfig(1M) command, a local user may be able to obtain the LDAP root Distinguished Name (rootDN) password from a temporary file.
The same may occur if a privileged user invokes any of the following commands in an unsecure manner:
* ldapadd(1)
* ldapdelete(1)
* ldapmodify(1)
* ldapmodrdn(1)
* ldapsearch(1)
With access to the rootDN password, the remote user can add, modify, delete, and search records within the LDAP Server.
Sun credits Michael Gerdts with reporting this vulnerability.
|
Impact:
A local user may be able to obtain the rootDN password.
|
Solution:
Sun has issued the following fixes.
SPARC Platform:
* Solaris 8 with patch 108993-51 or later
* Solaris 9 with patches 115677-02 or later and 121321-01 or later
x86 Platform
* Solaris 8 with patch 108994-51 or later
* Solaris 9 with patch 115678-02 or later and 121322-01 or later
The vendor recommends that any existing scripts or programs that use the ldapadd(1), ldapmodify(1), ldapmodrdn(1) or ldapsearch(1) commands with the -w option should use the new, secure -j option instead. The patched "/usr/lib/ldap/idsconfig" file contains examples.
The vendor's advisory is available at:
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102113-1
|
Vendor URL: sunsolve.sun.com/search/document.do?assetkey=1-26-102113-1 (Links to External Site)
|
Cause:
Access control error
|
Underlying OS: UNIX (Solaris - SunOS)
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|