Vulnerability Details : CVE-2004-0653
Solaris 9, when configured as a Kerberos client with patch 112908-12 or 115168-03 and using pam_krb5 as an "auth" module with the debug feature enabled, records passwords in plaintext, which could allow local users to gain other user's passwords by reading log files.
Exploit prediction scoring system (EPSS) score for CVE-2004-0653
Probability of exploitation activity in the next 30 days: 0.09%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 36 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2004-0653
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST |
References for CVE-2004-0653
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A255
-
http://www.ciac.org/ciac/bulletins/o-172.shtml
Patch;Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/16450
-
http://www.securityfocus.com/bid/10606
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2065
-
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57587
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101519-1
-
http://www.kb.cert.org/vuls/id/523710
Patch;Third Party Advisory;US Government Resource
Products affected by CVE-2004-0653
- cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*