Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2014-0132


The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.


Published

2014-03-18T17:02:53.420

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 6.5 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-287

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application fedoraproject 389_directory_server ≤ 1.2.11.25 Yes
Application fedoraproject 389_directory_server 1.2.11.1 Yes
Application fedoraproject 389_directory_server 1.2.11.5 Yes
Application fedoraproject 389_directory_server 1.2.11.6 Yes
Application fedoraproject 389_directory_server 1.2.11.8 Yes
Application fedoraproject 389_directory_server 1.2.11.9 Yes
Application fedoraproject 389_directory_server 1.2.11.10 Yes
Application fedoraproject 389_directory_server 1.2.11.11 Yes
Application fedoraproject 389_directory_server 1.2.11.12 Yes
Application fedoraproject 389_directory_server 1.2.11.13 Yes
Application fedoraproject 389_directory_server 1.2.11.14 Yes
Application fedoraproject 389_directory_server 1.2.11.15 Yes
Application fedoraproject 389_directory_server 1.2.11.17 Yes
Application fedoraproject 389_directory_server 1.2.11.19 Yes
Application fedoraproject 389_directory_server 1.2.11.20 Yes
Application fedoraproject 389_directory_server 1.2.11.21 Yes
Application fedoraproject 389_directory_server 1.2.11.22 Yes
Application fedoraproject 389_directory_server 1.2.11.23 Yes

References