Vulnerabilities > CVE-2011-1943 - Information Exposure Through Log Files vulnerability in multiple products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Fuzzing and observing application log data/errors for application mapping An attacker sends random, malformed, or otherwise unexpected messages to a target application and observes the application's log or error messages returned. Fuzzing techniques involve sending random or malformed messages to a target and monitoring the target's response. The attacker does not initially know how a target will respond to individual messages but by attempting a large number of message variants they may find a variant that trigger's desired behavior. In this attack, the purpose of the fuzzing is to observe the application's log and error messages, although fuzzing a target can also sometimes cause the target to enter an unstable state, causing a crash. By observing logs and error messages, the attacker can learn details about the configuration of the target application and might be able to cause the target to disclose sensitive information.
Nessus
NASL family | Fedora Local Security Checks |
NASL id | FEDORA_2011-7919.NASL |
description | This update includes no changes to NetworkManager but ensures that the latest update is installed to fix a security issue in NetworkManager-0.8.999-3.git20110526. This issue was previously fixed in NetworkManager-0.8.9997-1.git20110531.fc15 but was not marked as a security update. NetworkManager-0.8.999-3.git20110526 inadvertently included a piece of debugging code that may have logged some VPN passwords to syslog. That version was available as an update for five (5) days before the fixed version was available. Users are advised to inspect log files in /var/log (and any backups) for VPN passwords and remove any that are found. The string |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 55061 |
published | 2011-06-12 |
reporter | This script is Copyright (C) 2011-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/55061 |
title | Fedora 15 : NetworkManager-0.8.9997-2.git20110531.fc15 (2011-7919) |
code |
|
References
- http://www.openwall.com/lists/oss-security/2011/05/31/7
- https://bugzilla.redhat.com/show_bug.cgi?id=708876
- http://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6
- http://www.openwall.com/lists/oss-security/2011/05/31/6
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061329.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68057