Vulnerability Details : CVE-2010-3282
389 Directory Server before 1.2.7.1 (aka Red Hat Directory Server 8.2) and HP-UX Directory Server before B.08.10.03, when audit logging is enabled, logs the Directory Manager password (nsslapd-rootpw) in cleartext when changing cn=config:nsslapd-rootpw, which might allow local users to obtain sensitive information by reading the log.
Exploit prediction scoring system (EPSS) score for CVE-2010-3282
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 6 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-3282
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
1.9
|
LOW | AV:L/AC:M/Au:N/C:P/I:N/A:N |
3.4
|
2.9
|
NIST |
3.3
|
LOW | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
1.8
|
1.4
|
NIST |
CWE ids for CVE-2010-3282
-
The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-3282
-
https://git.fedorahosted.org/cgit/389/ds.git/commit/?id=d38ae06
Infrastructure/Fedorahosted-retirement - Fedora Project WikiProduct
-
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c02522633&docLocale=en_US
Vendor Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=625950
625950 – (CVE-2010-3282) CVE-2010-3282 RHDS/389: information disclosure in audit logsIssue Tracking;Third Party Advisory
-
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6914
OVAL - OVAL RepositoryNot Applicable
Products affected by CVE-2010-3282
- cpe:2.3:a:hp:hp-ux_directory_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:directory_server:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:redhat_directory_server:*:*:*:*:*:hp-ux:*:*
- cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*