First published: Fri Feb 25 2011(Updated: )
chain.c in back-ldap in OpenLDAP 2.4.x before 2.4.24, when a master-slave configuration with a chain overlay and ppolicy_forward_updates (aka authentication-failure forwarding) is used, allows remote authenticated users to bypass external-program authentication by sending an invalid password to a slave server.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenLDAP | =2.4.17 | |
OpenLDAP | =2.4.6 | |
OpenLDAP | =2.4.11 | |
OpenLDAP | =2.4.8 | |
OpenLDAP | =2.4.9 | |
OpenLDAP | =2.4.16 | |
OpenLDAP | =2.4.22 | |
OpenLDAP | =2.4.20 | |
OpenLDAP | =2.4.15 | |
OpenLDAP | =2.4.18 | |
OpenLDAP | =2.4.7 | |
OpenLDAP | =2.4.23 | |
OpenLDAP | =2.4.14 | |
OpenLDAP | =2.4.19 | |
OpenLDAP | =2.4.12 | |
OpenLDAP | =2.4.21 | |
OpenLDAP | =2.4.13 | |
OpenLDAP | =2.4.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1024 has been categorized as having a medium severity due to its potential impact on authentication mechanisms.
To mitigate CVE-2011-1024, upgrade OpenLDAP to version 2.4.24 or later, where the vulnerability has been resolved.
CVE-2011-1024 affects OpenLDAP versions prior to 2.4.24, including versions 2.4.6 to 2.4.23.
The main issue with CVE-2011-1024 is that it allows remote authenticated users to bypass external-program authentication.
Yes, CVE-2011-1024's exploitability is contingent on using a master-slave configuration with the chain overlay and ppolicy_forward_updates.