[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2014-311 ---- 389-ds-base

ID: oval:org.secpod.oval:def:1600044Date: (C)2016-01-05   (M)2023-02-20
Class: PATCHFamily: unix




It was discovered that the 389 Directory Server did not properly handle certain SASL-based authentication mechanisms. A user able to authenticate to the directory using these SASL mechanisms could connect as any other directory user, including the administrative Directory Manager account. This could allow them to modify configuration values, as well as read and write any data the directory holds.

Platform:
Amazon Linux AMI
Product:
389-ds-base
Reference:
ALAS-2014-311
CVE-2014-0132
CVE    1
CVE-2014-0132
CPE    20
cpe:/o:amazon:linux
cpe:/a:fedoraproject:389_directory_server
cpe:/a:fedoraproject:389_directory_server:1.2.11.19
cpe:/a:fedoraproject:389_directory_server:1.2.11.17
...

© SecPod Technologies