First published: Tue Mar 18 2014(Updated: )
The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fedoraproject 389 Directory Server | <=1.2.11.25 | |
Fedoraproject 389 Directory Server | =1.2.11.1 | |
Fedoraproject 389 Directory Server | =1.2.11.5 | |
Fedoraproject 389 Directory Server | =1.2.11.6 | |
Fedoraproject 389 Directory Server | =1.2.11.8 | |
Fedoraproject 389 Directory Server | =1.2.11.9 | |
Fedoraproject 389 Directory Server | =1.2.11.10 | |
Fedoraproject 389 Directory Server | =1.2.11.11 | |
Fedoraproject 389 Directory Server | =1.2.11.12 | |
Fedoraproject 389 Directory Server | =1.2.11.13 | |
Fedoraproject 389 Directory Server | =1.2.11.14 | |
Fedoraproject 389 Directory Server | =1.2.11.15 | |
Fedoraproject 389 Directory Server | =1.2.11.17 | |
Fedoraproject 389 Directory Server | =1.2.11.19 | |
Fedoraproject 389 Directory Server | =1.2.11.20 | |
Fedoraproject 389 Directory Server | =1.2.11.21 | |
Fedoraproject 389 Directory Server | =1.2.11.22 | |
Fedoraproject 389 Directory Server | =1.2.11.23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.