Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-0132

Опубликовано: 18 мар. 2014
Источник: debian
EPSS Низкий

Описание

The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
389-ds-basefixed1.3.2.9-1.1package

EPSS

Процентиль: 68%
0.00573
Низкий

Связанные уязвимости

ubuntu
больше 11 лет назад

The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.

redhat
больше 11 лет назад

The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.

nvd
больше 11 лет назад

The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.

github
больше 3 лет назад

The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.

oracle-oval
больше 11 лет назад

ELSA-2014-0292: 389-ds-base security update (IMPORTANT)

EPSS

Процентиль: 68%
0.00573
Низкий