COMMAND
Shiva Access Manager
SYSTEMS AFFECTED
Shiva Access Manager 5.0.0
PROBLEM
Blaise St. Laurent found following. In testing Intel's Shiva
Access Manager RADIUS/Tacacs+ product, he recently came across an
important security hole in the LDAP connectivity on the Solaris
platform version of this product.
When you configure the S.A.M. to store all of it's information in
an LDAP directory, it asks that you give it the root DN's name and
password, which it then stores in plaintext in the file.
$SHIVA_HOME_DIR/insnmgmt/shiva_access_manager/radtac.ini
with the rest of the configuration, (including LDAP server and
port) which is by default world readable (owned by root). To
get this information constitutes a total breach of your LDAP
server.
SOLUTION
That being said, there is a possible workaround. Have SAM use a
non-root DN account on the LDAP server that has just enough
permissions to modify those fields within the directory that are
needed. You can forsee an account that can only change the Shiva
extensible objects within the user profile. This limits the
ammount of damage that may be done, but doesn't aleviate the
problem of having someone with unauthorized write priveledges in
your directory.