The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2014-0292.html - | |
References | () http://secunia.com/advisories/57412 - Vendor Advisory | |
References | () http://secunia.com/advisories/57427 - Vendor Advisory | |
References | () https://fedorahosted.org/389/changeset/76acff12a86110d4165f94e2cba13ef5c7ebc38a/ - Exploit | |
References | () https://fedorahosted.org/389/ticket/47739 - Patch |
Information
Published : 2014-03-18 17:02
Updated : 2024-11-21 02:01
NVD link : CVE-2014-0132
Mitre link : CVE-2014-0132
CVE.ORG link : CVE-2014-0132
JSON object : View
Products Affected
fedoraproject
- 389_directory_server
CWE
CWE-287
Improper Authentication