Информационная безопасность
[RU] switch to English


Уязвимости безопасности в EMC RSA Authentication Manager
дополнено с 4 июня 2013 г.
Опубликовано:15 июля 2013 г.
Источник:
SecurityVulns ID:13108
Тип:удаленная
Уровень опасности:
6/10
Описание:Утечка информации, инъекция SQL.
Затронутые продукты:EMC : RSA Authentication Manager 8.0
CVE:CVE-2013-3273 (EMC RSA Authentication Manager 8.0 before P2 and 7.1 before SP4 P26, as used in Appliance 3.0, does not omit the cleartext administrative password from trace logging in custom SDK applications, which allows local users to obtain sensitive information by reading the trace log file.)
 CVE-2013-1899 (Argument injection vulnerability in PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, and 9.0.x before 9.0.13 allows remote attackers to cause a denial of service (file corruption), and allows remote authenticated users to modify configuration settings and execute arbitrary code, via a connection request using a database name that begins with a "-" (hyphen).)
 CVE-2013-0947 (EMC RSA Authentication Manager 8.0 before P1 allows local users to discover cleartext operating-system passwords, HTTP plug-in proxy passwords, and SNMP communities by reading a (1) log file or (2) configuration file.)
Оригинальный текстdocumentEMC, ESA-2013-052: RSA(r) Authentication Manager Sensitive Information Disclosure Vulnerability (15.07.2013)
 documentEMC, ESA-2013-040: RSA® Authentication Manager 8.0 Multiple Vulnerabilities (04.06.2013)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород