Vulnerability
iplanet
Affected
iplanet calendar server 5.0p2
Description
Adam Laurie found following. At the time of writing, 5.0p2 is
the currently available revision on iplanet's download site.
The standard install of iPlanet Calendar server stores the NAS
LDAP admin username and password in plaintext in the world
readable file:
-rw-r--r-- 1 icsuser icsgroup 37882 Feb 20 10:18 /opt/SUNWics5/cal/bin/config/ics.conf
in the fields
local.authldapbinddn (username)
and
local.authldapbindcred (password)
this potentially gives all local users full read/write access to
the underlying NAS LDAP database (which is normally used for admin
facilities such as storing user / group profiles, passwords, ACLs,
SSL certificates and/or other sensitive company information), and
full administrative control of the local NAS server. This access
could in turn lead to compromise of other facilities such as
web/e-commerce sites, directories etc.
We believe that the default install of the underlying NAS LDAP
server and associated administration packages allow remote admin
via tcp/ip, so other remote compromises that allow reading of
world readable files (or any other disclosures of the above file
contents) could lead to full remote read/write access of the NAS
LDAP database and full remote administrative control of the
server.
Solution
This was reported to iplanet at the end of february 2001, who
requested Adam to submit it to netscape's online bug-tracking
system which he did on 3rd march. He has heard nothing from them
since. He has not personally investigated or tested any fix for
this.
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH