Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-4450

Опубликовано: 01 окт. 2012
Источник: debian
EPSS Низкий

Описание

389 Directory Server 1.2.10 does not properly update the ACL when a DN entry is moved by a modrdn operation, which allows remote authenticated users with certain permissions to bypass ACL restrictions and access the DN entry.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
389-ds-basefixed1.2.11.15-1package

Примечания

  • Upstream ticket https://fedorahosted.org/389/ticket/340

  • Upstream patch http://git.fedorahosted.org/cgit/389/ds.git/commit/?id=5beb93d42efb807838c09c5fab898876876f8d09

EPSS

Процентиль: 59%
0.00378
Низкий

Связанные уязвимости

ubuntu
почти 13 лет назад

389 Directory Server 1.2.10 does not properly update the ACL when a DN entry is moved by a modrdn operation, which allows remote authenticated users with certain permissions to bypass ACL restrictions and access the DN entry.

redhat
больше 13 лет назад

389 Directory Server 1.2.10 does not properly update the ACL when a DN entry is moved by a modrdn operation, which allows remote authenticated users with certain permissions to bypass ACL restrictions and access the DN entry.

nvd
почти 13 лет назад

389 Directory Server 1.2.10 does not properly update the ACL when a DN entry is moved by a modrdn operation, which allows remote authenticated users with certain permissions to bypass ACL restrictions and access the DN entry.

github
больше 3 лет назад

389 Directory Server 1.2.10 does not properly update the ACL when a DN entry is moved by a modrdn operation, which allows remote authenticated users with certain permissions to bypass ACL restrictions and access the DN entry.

oracle-oval
больше 12 лет назад

ELSA-2013-0503: 389-ds-base security, bug fix, and enhancement update (MODERATE)

EPSS

Процентиль: 59%
0.00378
Низкий