Vulnerability Details : CVE-2016-4984
/usr/libexec/openldap/generate-server-cert.sh in openldap-servers sets weak permissions for the TLS certificate, which allows local users to obtain the TLS certificate by leveraging a race condition between the creation of the certificate, and the chmod to protect it.
Products affected by CVE-2016-4984
- cpe:2.3:a:openldap:openldap-servers:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-4984
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-4984
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
1.9
|
LOW | AV:L/AC:M/Au:N/C:P/I:N/A:N |
3.4
|
2.9
|
NIST | |
4.7
|
MEDIUM | CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.0
|
3.6
|
NIST |
CWE ids for CVE-2016-4984
-
The product contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-4984
-
https://bugzilla.redhat.com/show_bug.cgi?id=1346120
1346120 – (CVE-2016-4984) CVE-2016-4984 openldap-servers: /usr/libexec/openldap/generate-server-cert.sh create world readable password fileIssue Tracking;Third Party Advisory
Jump to