First published: Fri Feb 25 2011(Updated: )
chain.c in back-ldap in OpenLDAP 2.4.x before 2.4.24, when a master-slave configuration with a chain overlay and ppolicy_forward_updates (aka authentication-failure forwarding) is used, allows remote authenticated users to bypass external-program authentication by sending an invalid password to a slave server.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Openldap Openldap | =2.4.17 | |
Openldap Openldap | =2.4.6 | |
Openldap Openldap | =2.4.11 | |
Openldap Openldap | =2.4.8 | |
Openldap Openldap | =2.4.9 | |
Openldap Openldap | =2.4.16 | |
Openldap Openldap | =2.4.22 | |
Openldap Openldap | =2.4.20 | |
Openldap Openldap | =2.4.15 | |
Openldap Openldap | =2.4.18 | |
Openldap Openldap | =2.4.7 | |
Openldap Openldap | =2.4.23 | |
Openldap Openldap | =2.4.14 | |
Openldap Openldap | =2.4.19 | |
Openldap Openldap | =2.4.12 | |
Openldap Openldap | =2.4.21 | |
Openldap Openldap | =2.4.13 | |
Openldap Openldap | =2.4.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.