CVE-2007-5626
low-risk
Published 2007-10-23
make_catalog_backup in Bacula 2.2.5, and probably earlier, sends a MySQL password as a command line argument, and sometimes transmits cleartext e-mail containing this command line, which allows context-dependent attackers to obtain the password by listing the process and its arguments, or by sniffing the network.
Do I need to act?
-
0.04% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.5/10
Medium
LOCAL
/ LOW complexity
Affected Products (1)
Bacula
Affected Vendors
References (18)
Permissions Required
http://bugs.bacula.org/view.php?id=990
Issue Tracking
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446809
Broken Link
http://osvdb.org/41861
Broken Link
http://secunia.com/advisories/27243
Broken Link
http://secunia.com/advisories/31184
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200807-10.xml
Broken Link
http://www.securityfocus.com/bid/26156
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/37336
Permissions Required
http://bugs.bacula.org/view.php?id=990
Issue Tracking
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446809
Broken Link
http://osvdb.org/41861
Broken Link
http://secunia.com/advisories/27243
Broken Link
http://secunia.com/advisories/31184
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200807-10.xml
Broken Link
http://www.securityfocus.com/bid/26156
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/37336
23
/ 100
low-risk
Severity
18/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal