First published: Tue Mar 18 2014(Updated: )
The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat 389 Directory Server | <=1.2.11.25 | |
Red Hat 389 Directory Server | =1.2.11.1 | |
Red Hat 389 Directory Server | =1.2.11.5 | |
Red Hat 389 Directory Server | =1.2.11.6 | |
Red Hat 389 Directory Server | =1.2.11.8 | |
Red Hat 389 Directory Server | =1.2.11.9 | |
Red Hat 389 Directory Server | =1.2.11.10 | |
Red Hat 389 Directory Server | =1.2.11.11 | |
Red Hat 389 Directory Server | =1.2.11.12 | |
Red Hat 389 Directory Server | =1.2.11.13 | |
Red Hat 389 Directory Server | =1.2.11.14 | |
Red Hat 389 Directory Server | =1.2.11.15 | |
Red Hat 389 Directory Server | =1.2.11.17 | |
Red Hat 389 Directory Server | =1.2.11.19 | |
Red Hat 389 Directory Server | =1.2.11.20 | |
Red Hat 389 Directory Server | =1.2.11.21 | |
Red Hat 389 Directory Server | =1.2.11.22 | |
Red Hat 389 Directory Server | =1.2.11.23 | |
<=1.2.11.25 | ||
=1.2.11.1 | ||
=1.2.11.5 | ||
=1.2.11.6 | ||
=1.2.11.8 | ||
=1.2.11.9 | ||
=1.2.11.10 | ||
=1.2.11.11 | ||
=1.2.11.12 | ||
=1.2.11.13 | ||
=1.2.11.14 | ||
=1.2.11.15 | ||
=1.2.11.17 | ||
=1.2.11.19 | ||
=1.2.11.20 | ||
=1.2.11.21 | ||
=1.2.11.22 | ||
=1.2.11.23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0132 is classified as a medium severity vulnerability.
To fix CVE-2014-0132, upgrade to 389 Directory Server version 1.2.11.26 or later.
CVE-2014-0132 affects 389 Directory Server versions prior to 1.2.11.26.
Yes, CVE-2014-0132 can be exploited by remote authenticated users to gain higher privileges.
The main impact of CVE-2014-0132 is that it allows unauthorized access to arbitrary user privileges.