Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-1854

Опубликовано: 19 сент. 2017
Источник: debian

Описание

389 Directory Server before 1.3.3.10 allows attackers to bypass intended access restrictions and modify directory entries via a crafted ldapmodrdn call.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
389-ds-basefixed1.3.3.10-1package

Примечания

  • Patch applied to CentOS package: https://git.centos.org/raw/rpms!389-ds-base.git!/309aa9ee631432d72c845f70df2ce6475055423b/SOURCES!0062-CVE-2015-1854-389ds-base-access-control-bypass-with-.patch

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 8 лет назад

389 Directory Server before 1.3.3.10 allows attackers to bypass intended access restrictions and modify directory entries via a crafted ldapmodrdn call.

redhat
почти 11 лет назад

389 Directory Server before 1.3.3.10 allows attackers to bypass intended access restrictions and modify directory entries via a crafted ldapmodrdn call.

CVSS3: 7.5
nvd
больше 8 лет назад

389 Directory Server before 1.3.3.10 allows attackers to bypass intended access restrictions and modify directory entries via a crafted ldapmodrdn call.

CVSS3: 7.5
github
больше 3 лет назад

389 Directory Server before 1.3.3.10 allows attackers to bypass intended access restrictions and modify directory entries via a crafted ldapmodrdn call.

oracle-oval
почти 11 лет назад

ELSA-2015-0895: 389-ds-base security update (IMPORTANT)