First published: Thu Jul 15 2021(Updated: )
A flaw was found in 389-ds-base. If an asterisk is imported as password hashes, either accidentally or maliciously, then instead of being inactive, any password will successfully match during authentication. This flaw allows an attacker to successfully authenticate as a user whose password was disabled.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Port389 389-ds-base | <2.0.7 | |
redhat/389-ds-base | <2.0.7 | 2.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3652 is a vulnerability found in 389-ds-base that allows an attacker to successfully authenticate as a user whose password was disabled.
CVE-2021-3652 has a severity value of 6.5 (Medium).
389-ds-base version 2.0.7 is affected by CVE-2021-3652.
To fix CVE-2021-3652, update 389-ds-base to version 2.0.8 or later.
More information about CVE-2021-3652 can be found on Red Hat Bugzilla, GitHub, and Debian LTS Announce.