9 results (0.008 seconds)

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

PADL MigrationTools 46 creates temporary files insecurely, which allows local users to overwrite arbitrary files via a symlink attack on the temporary files, which are not properly created by (1) migrate_all_online.sh, (2) migrate_all_offline.sh, (3) migrate_all_netinfo_online.sh, (4) migrate_all_netinfo_offline.sh, (5) migrate_all_nis_online.sh, (6) migrate_all_nis_offline.sh, (7) migrate_all_nisplus_online.sh, and (8) migrate_all_nisplus_offline.sh. PADL MigrationTools 46 crea archivos temporales de forma insegura, lo que permite a usuarios locales sobrescribir archivos arbitrarios a través de un ataque de enlace simbólico en los archivos temporales, que no son creados adecuadamente por (1) migrate_all_online.sh, (2) migrate_all_offline.sh, (3) migrate_all_netinfo_online.sh, (4) migrate_all_netinfo_offline.sh, (5) migrate_all_nis_online.sh, (6) migrate_all_nis_offline.sh, (7) migrate_all_nisplus_online.sh y (8) migrate_all_nisplus_offline.sh. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=338920 http://secunia.com/advisories/22243 http://www.vupen.com/english/advisories/2005/2427 https://www.debian.org/security/2006/dsa-1187 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

PADL MigrationTools 46, when a failure occurs, stores contents of /etc/shadow in a world-readable /tmp/nis.$$.ldif file, and possibly other sensitive information in other temporary files, which are not properly managed by (1) migrate_all_online.sh, (2) migrate_all_offline.sh, (3) migrate_all_netinfo_online.sh, (4) migrate_all_netinfo_offline.sh, (5) migrate_all_nis_online.sh, (6) migrate_all_nis_offline.sh, (7) migrate_all_nisplus_online.sh, and (8) migrate_all_nisplus_offline.sh. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=338920 http://secunia.com/advisories/17530 http://www.osvdb.org/20839 http://www.vupen.com/english/advisories/2005/2427 https://exchange.xforce.ibmcloud.com/vulnerabilities/42335 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Unknown vulnerability in pam_ldap before 180 does not properly handle a new password policy control, which could allow attackers to gain privileges. NOTE: CVE-2005-2497 had also been assigned to this issue, but CVE-2005-2641 is the correct candidate. • http://secunia.com/advisories/17233 http://secunia.com/advisories/17270 http://www.kb.cert.org/vuls/id/778916 http://www.mandriva.com/security/advisories?name=MDKSA-2005:190 http://www.redhat.com/support/errata/RHSA-2005-767.html http://www.securityfocus.com/archive/1/447859/100/200/threaded http://www.securityfocus.com/bid/14649 https://issues.rpath.com/browse/RPL-680 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10370 https://w •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password. • http://archives.neohapsis.com/archives/fulldisclosure/2005-07/0060.html http://bugs.gentoo.org/show_bug.cgi?id=96767 http://bugzilla.padl.com/show_bug.cgi?id=210 http://bugzilla.padl.com/show_bug.cgi?id=211 http://secunia.com/advisories/17233 http://secunia.com/advisories/17845 http://secunia.com/advisories/21520 http://support.avaya.com/elmodocs2/security/ASA-2006-157.htm http://www.gentoo.org/security/en/glsa/glsa-200507-13.xml http://www.openldap.org/its/inde • CWE-319: Cleartext Transmission of Sensitive Information •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Unknown vulnerability in the pam_filter mechanism in pam_ldap before version 162, when LDAP based authentication is being used, allows users to bypass host-based access restrictions and log onto the system. • http://www.mandriva.com/security/advisories?name=MDKSA-2003:088 •