Summary: | <net-nds/389-ds-base-1.3.4.8: SASL/GSSAPI Security Bypass Security Issue (CVE-2014-0132) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | trivial | CC: | lxnay |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://secunia.com/advisories/57427/ | ||
Whiteboard: | ~4 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2014-03-15 15:32:56 UTC
CVE-2014-0132 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0132): The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind. Hi, We have updated 389-ds-base to 1.3.4.7. This should resolve the issue. Thanks, Referenced commit 5a7174bf7122309eee568651fb5f3413155f9fc2 No vulnerable versions in tree. |