The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.
References
Link | Resource |
---|---|
https://fedorahosted.org/389/changeset/76acff12a86110d4165f94e2cba13ef5c7ebc38a/ | Exploit |
https://fedorahosted.org/389/ticket/47739 | Patch |
http://secunia.com/advisories/57412 | Vendor Advisory |
http://rhn.redhat.com/errata/RHSA-2014-0292.html | |
http://secunia.com/advisories/57427 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2014-03-18 10:02
Updated : 2023-02-12 16:32
NVD link : CVE-2014-0132
Mitre link : CVE-2014-0132
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
fedoraproject
- 389_directory_server