{"id":"UBUNTU-CVE-2012-2678","details":"389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), after the password for a LDAP user has been changed and before the server has been reset, allows remote attackers to read the plaintext password via the unhashed#user#password attribute.","modified":"2025-07-16T07:17:01.628032Z","published":"2012-07-03T16:40:00Z","withdrawn":"2025-07-18T16:42:46Z","upstream":["CVE-2012-2678"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2012-2678"},{"type":"REPORT","url":"https://rhn.redhat.com/errata/RHSA-2012-0997.html"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2012-2678"}],"affected":[{"package":{"name":"389-ds-base","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/389-ds-base@1.3.2.16-0ubuntu1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.3.2.16-0ubuntu1"}]}],"versions":["1.3.1.9-0ubuntu2","1.3.1.9-0ubuntu3","1.3.1.9-0ubuntu4","1.3.2.11-0ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_version":"1.3.2.16-0ubuntu1","binary_name":"389-ds"},{"binary_version":"1.3.2.16-0ubuntu1","binary_name":"389-ds-base"},{"binary_version":"1.3.2.16-0ubuntu1","binary_name":"389-ds-base-dbg"},{"binary_version":"1.3.2.16-0ubuntu1","binary_name":"389-ds-base-dev"},{"binary_version":"1.3.2.16-0ubuntu1","binary_name":"389-ds-base-libs"},{"binary_version":"1.3.2.16-0ubuntu1","binary_name":"389-ds-base-libs-dbg"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2012/UBUNTU-CVE-2012-2678.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"medium"}]}