CVE-2012-2678
Severity CVSS v4.0:
Pending analysis
Type:
CWE-310
Cryptographic Issues
Publication date:
03/07/2012
Last modified:
11/04/2025
Description
389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), after the password for a LDAP user has been changed and before the server has been reset, allows remote attackers to read the plaintext password via the unhashed#user#password attribute.
Impact
Base Score 2.0
1.20
Severity 2.0
LOW
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:redhat:directory_server:*:*:*:*:*:*:*:* | 8.2 (including) | |
cpe:2.3:a:redhat:directory_server:7.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:directory_server:8.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:directory_server:8.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:* | 1.2.11.5 (including) | |
cpe:2.3:a:fedoraproject:389_directory_server:1.2.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:fedoraproject:389_directory_server:1.2.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:fedoraproject:389_directory_server:1.2.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc1:*:*:*:*:*:* | ||
cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc2:*:*:*:*:*:* | ||
cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc3:*:*:*:*:*:* | ||
cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc4:*:*:*:*:*:* | ||
cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://directory.fedoraproject.org/wiki/Release_Notes
- http://osvdb.org/83336
- http://rhn.redhat.com/errata/RHSA-2012-0997.html
- http://rhn.redhat.com/errata/RHSA-2012-1041.html
- http://secunia.com/advisories/49734
- http://www.securityfocus.com/bid/54153
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19353
- http://directory.fedoraproject.org/wiki/Release_Notes
- http://osvdb.org/83336
- http://rhn.redhat.com/errata/RHSA-2012-0997.html
- http://rhn.redhat.com/errata/RHSA-2012-1041.html
- http://secunia.com/advisories/49734
- http://www.securityfocus.com/bid/54153
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19353