First published: Tue Jul 14 2020(Updated: )
libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openldap Openldap | <2.4.46-10.el8 | |
Redhat Enterprise Linux | =8.0 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
McAfee Policy Auditor | <6.5.1 | |
Oracle Blockchain Platform | <21.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15719 is a vulnerability in libldap in certain third-party OpenLDAP packages that has a certificate-validation flaw.
CVE-2020-15719 affects certain third-party OpenLDAP packages when they are asserting RFC6125 support.
CVE-2020-15719 has a severity level of medium with a severity value of 4.2.
To fix CVE-2020-15719, you should update to the fixed version of OpenLDAP, such as openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.
You can find more information about CVE-2020-15719 in the following references: - http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html - http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html - https://access.redhat.com/errata/RHBA-2019:3674