CVE-2011-3196
21.03.2014, 04:38
The setup script in Domain Technologie Control (DTC) before 0.34.1 uses world-readable permissions for /etc/apache2/apache2.conf, which allows local users to obtain the dtcdaemons MySQL password by reading the file.Enginsight
Vendor | Product | Version |
---|---|---|
gplhost | domain_technologie_control | 𝑥 ≤ 0.32.11 |
gplhost | domain_technologie_control | 0.24.6 |
gplhost | domain_technologie_control | 0.25.1 |
gplhost | domain_technologie_control | 0.25.2 |
gplhost | domain_technologie_control | 0.25.3 |
gplhost | domain_technologie_control | 0.26.7 |
gplhost | domain_technologie_control | 0.26.8 |
gplhost | domain_technologie_control | 0.26.9 |
gplhost | domain_technologie_control | 0.27.3 |
gplhost | domain_technologie_control | 0.28.2 |
gplhost | domain_technologie_control | 0.28.3 |
gplhost | domain_technologie_control | 0.28.4 |
gplhost | domain_technologie_control | 0.28.6 |
gplhost | domain_technologie_control | 0.28.9 |
gplhost | domain_technologie_control | 0.28.10 |
gplhost | domain_technologie_control | 0.29.1 |
gplhost | domain_technologie_control | 0.29.6 |
gplhost | domain_technologie_control | 0.29.8 |
gplhost | domain_technologie_control | 0.29.10 |
gplhost | domain_technologie_control | 0.29.14 |
gplhost | domain_technologie_control | 0.29.15 |
gplhost | domain_technologie_control | 0.29.16 |
gplhost | domain_technologie_control | 0.29.17 |
gplhost | domain_technologie_control | 0.30.6 |
gplhost | domain_technologie_control | 0.30.8 |
gplhost | domain_technologie_control | 0.30.10 |
gplhost | domain_technologie_control | 0.30.18 |
gplhost | domain_technologie_control | 0.30.20 |
gplhost | domain_technologie_control | 0.32.1 |
gplhost | domain_technologie_control | 0.32.2 |
gplhost | domain_technologie_control | 0.32.3 |
gplhost | domain_technologie_control | 0.32.4 |
gplhost | domain_technologie_control | 0.32.5 |
gplhost | domain_technologie_control | 0.32.6 |
gplhost | domain_technologie_control | 0.32.7 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References