First published: Tue Apr 07 2015(Updated: )
389 Directory Server before 1.3.3.10 allows attackers to bypass intended access restrictions and modify directory entries via a crafted ldapmodrdn call.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat 389 Directory Server | <=1.3.3.9 | |
Fedora | =22 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1854 is classified as a medium severity vulnerability due to its potential for unauthorized modification of directory entries.
To fix CVE-2015-1854, update to 389 Directory Server version 1.3.3.10 or later to ensure the access control bypass is mitigated.
CVE-2015-1854 affects 389 Directory Server versions prior to 1.3.3.10, Fedora 22, and Debian 8.0.
CVE-2015-1854 allows attackers to bypass access restrictions and alter their own directory entries via a crafted ldapmodrdn request.
Yes, CVE-2015-1854 specifically involves vulnerabilities in LDAP operations, particularly the modrdn command.