Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2011-1024

Опубликовано: 20 мар. 2011
Источник: nvd
CVSS2: 4.6
EPSS Низкий

Описание

chain.c in back-ldap in OpenLDAP 2.4.x before 2.4.24, when a master-slave configuration with a chain overlay and ppolicy_forward_updates (aka authentication-failure forwarding) is used, allows remote authenticated users to bypass external-program authentication by sending an invalid password to a slave server.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:openldap:openldap:2.4.6:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.7:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.8:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.9:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.10:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.11:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.12:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.13:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.14:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.15:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.16:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.17:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.18:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.19:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.20:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.21:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.22:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.23:*:*:*:*:*:*:*

EPSS

Процентиль: 48%
0.00247
Низкий

4.6 Medium

CVSS2

Дефекты

CWE-264

Связанные уязвимости

ubuntu
больше 14 лет назад

chain.c in back-ldap in OpenLDAP 2.4.x before 2.4.24, when a master-slave configuration with a chain overlay and ppolicy_forward_updates (aka authentication-failure forwarding) is used, allows remote authenticated users to bypass external-program authentication by sending an invalid password to a slave server.

redhat
почти 15 лет назад

chain.c in back-ldap in OpenLDAP 2.4.x before 2.4.24, when a master-slave configuration with a chain overlay and ppolicy_forward_updates (aka authentication-failure forwarding) is used, allows remote authenticated users to bypass external-program authentication by sending an invalid password to a slave server.

debian
больше 14 лет назад

chain.c in back-ldap in OpenLDAP 2.4.x before 2.4.24, when a master-sl ...

github
около 3 лет назад

chain.c in back-ldap in OpenLDAP 2.4.x before 2.4.24, when a master-slave configuration with a chain overlay and ppolicy_forward_updates (aka authentication-failure forwarding) is used, allows remote authenticated users to bypass external-program authentication by sending an invalid password to a slave server.

oracle-oval
больше 14 лет назад

ELSA-2011-0346: openldap security and bug fix update (MODERATE)

EPSS

Процентиль: 48%
0.00247
Низкий

4.6 Medium

CVSS2

Дефекты

CWE-264