First published: Wed Aug 02 2017(Updated: )
389-ds-base version before 1.3.5.19 and 1.3.6.7 are vulnerable to password brute-force attacks during account lockout due to different return codes returned on password attempts.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat 389 Directory Server | =1.3.5.19 | |
Red Hat 389 Directory Server | =1.3.6.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7551 has a medium severity rating due to its potential to allow password brute-force attacks.
To fix CVE-2017-7551, upgrade to 389-ds-base version 1.3.5.19 or 1.3.6.7 or later.
The affected software versions for CVE-2017-7551 are 389-ds-base versions before 1.3.5.19 and 1.3.6.7.
CVE-2017-7551 exposes systems to password brute-force attacks due to inconsistent return codes on authentication attempts.
Yes, CVE-2017-7551 is related to account lockout policies that are ineffective against brute force due to varying return codes.