Описание
389 Directory Server 1.2.10 does not properly update the ACL when a DN entry is moved by a modrdn operation, which allows remote authenticated users with certain permissions to bypass ACL restrictions and access the DN entry.
389 Directory Server 1.2.10 does not properly update the ACL when a DN entry is moved by a modrdn operation, which allows remote authenticated users with certain permissions to bypass ACL restrictions and access the DN entry.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2012-4450
- https://bugzilla.redhat.com/show_bug.cgi?id=860772
- https://fedorahosted.org/389/ticket/340
- http://git.fedorahosted.org/cgit/389/ds.git/commit/?id=5beb93d42efb807838c09c5fab898876876f8d09
- http://rhn.redhat.com/errata/RHSA-2013-0503.html
- http://secunia.com/advisories/50713
- http://www.openwall.com/lists/oss-security/2012/09/26/3
- http://www.openwall.com/lists/oss-security/2012/09/26/5
- http://www.securityfocus.com/bid/55690
EPSS
CVE ID
Связанные уязвимости
389 Directory Server 1.2.10 does not properly update the ACL when a DN entry is moved by a modrdn operation, which allows remote authenticated users with certain permissions to bypass ACL restrictions and access the DN entry.
389 Directory Server 1.2.10 does not properly update the ACL when a DN entry is moved by a modrdn operation, which allows remote authenticated users with certain permissions to bypass ACL restrictions and access the DN entry.
389 Directory Server 1.2.10 does not properly update the ACL when a DN entry is moved by a modrdn operation, which allows remote authenticated users with certain permissions to bypass ACL restrictions and access the DN entry.
389 Directory Server 1.2.10 does not properly update the ACL when a DN ...
ELSA-2013-0503: 389-ds-base security, bug fix, and enhancement update (MODERATE)
EPSS