Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-15719


libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.


Published

2020-07-14T14:15:17.667

Last Modified

2024-11-21T05:06:05.903

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 4.2 (MEDIUM)

CVSSv2 Vector

AV:N/AC:H/Au:N/C:P/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: HIGH
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

4.9

Impact Score

4.9

Weaknesses
  • Type: Primary
    CWE-295

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application openldap openldap < 2.4.46-10.el8 Yes
Operating System redhat enterprise_linux 8.0 Yes
Operating System opensuse leap 15.1 Yes
Operating System opensuse leap 15.2 Yes
Application mcafee policy_auditor < 6.5.1 Yes
Application oracle blockchain_platform < 21.1.2 Yes

References