First published: Mon Oct 01 2012(Updated: )
389 Directory Server 1.2.10 does not properly update the ACL when a DN entry is moved by a modrdn operation, which allows remote authenticated users with certain permissions to bypass ACL restrictions and access the DN entry.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat 389 Directory Server | =1.2.10 |
http://git.fedorahosted.org/cgit/389/ds.git/commit/?id=5beb93d42efb807838c09c5fab898876876f8d09
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4450 is classified as a medium severity vulnerability.
To remediate CVE-2012-4450, upgrade to a version of 389 Directory Server that has addressed this issue.
Remote authenticated users with certain permissions on systems running 389 Directory Server 1.2.10 are affected by CVE-2012-4450.
CVE-2012-4450 allows unauthorized access to DN entries by bypassing Access Control Lists.
The specific vulnerable version is 389 Directory Server 1.2.10.