CVE-2007-5626
make_catalog_backup in Bacula 2.2.5, and probably earlier, sends a MySQL password as a command line argument, and sometimes transmits cleartext e-mail containing this command line, which allows context-dependent attackers to obtain the password by listing the process and its arguments, or by sniffing the network.
Published
2007-10-23T16:46:00.000
Last Modified
2025-04-09T00:30:58.490
Status
Deferred
Source
[email protected]
Severity
CVSSv3.1: 5.5 (MEDIUM)
CVSSv2 Vector
AV:L/AC:L/Au:N/C:P/I:N/A:N
- Access Vector: LOCAL
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: PARTIAL
- Integrity Impact: NONE
- Availability Impact: NONE
Exploitability Score
3.9
Impact Score
2.9
Weaknesses
Affected Vendors & Products
Type |
Vendor |
Product |
Version/Range |
Vulnerable? |
Application |
bacula
|
bacula
|
≤ 2.2.5 |
Yes
|
References
-
http://bugs.bacula.org/view.php?id=990
Permissions Required, Vendor Advisory
([email protected])
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446809
Issue Tracking, Mailing List, Third Party Advisory
([email protected])
-
http://osvdb.org/41861
Broken Link
([email protected])
-
http://secunia.com/advisories/27243
Broken Link, Third Party Advisory
([email protected])
-
http://secunia.com/advisories/31184
Broken Link, Third Party Advisory
([email protected])
-
http://security.gentoo.org/glsa/glsa-200807-10.xml
Third Party Advisory
([email protected])
-
http://www.securityfocus.com/bid/26156
Broken Link, Third Party Advisory, VDB Entry
([email protected])
-
http://www.vupen.com/english/advisories/2007/3572
Broken Link, Permissions Required, Third Party Advisory
([email protected])
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/37336
Third Party Advisory, VDB Entry
([email protected])
-
http://bugs.bacula.org/view.php?id=990
Permissions Required, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446809
Issue Tracking, Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://osvdb.org/41861
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/27243
Broken Link, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/31184
Broken Link, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://security.gentoo.org/glsa/glsa-200807-10.xml
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/26156
Broken Link, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vupen.com/english/advisories/2007/3572
Broken Link, Permissions Required, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/37336
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)