Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-1854

Опубликовано: 28 апр. 2015
Источник: redhat
CVSS2: 4.8
EPSS Низкий

Описание

389 Directory Server before 1.3.3.10 allows attackers to bypass intended access restrictions and modify directory entries via a crafted ldapmodrdn call.

A flaw was found in the way Red Hat Directory Server performed authorization of modrdn operations. An unauthenticated attacker able to issue an ldapmodrdn call to the directory server could use this flaw to perform unauthorized modifications of entries in the directory server.

Отчет

This issue does not affect the version of 389-ds-base package as shipped with Red Hat Enterprise Linux 6.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Directory Server 8redhat-ds-baseNot affected
Red Hat Enterprise Linux 6389-ds-baseNot affected
Red Hat Enterprise Linux 7389-ds-baseFixedRHSA-2015:089528.04.2015

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-697->CWE-863
https://bugzilla.redhat.com/show_bug.cgi?id=1209573389-ds-base: access control bypass with modrdn

EPSS

Процентиль: 62%
0.00432
Низкий

4.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 8 лет назад

389 Directory Server before 1.3.3.10 allows attackers to bypass intended access restrictions and modify directory entries via a crafted ldapmodrdn call.

CVSS3: 7.5
nvd
почти 8 лет назад

389 Directory Server before 1.3.3.10 allows attackers to bypass intended access restrictions and modify directory entries via a crafted ldapmodrdn call.

CVSS3: 7.5
debian
почти 8 лет назад

389 Directory Server before 1.3.3.10 allows attackers to bypass intend ...

CVSS3: 7.5
github
больше 3 лет назад

389 Directory Server before 1.3.3.10 allows attackers to bypass intended access restrictions and modify directory entries via a crafted ldapmodrdn call.

oracle-oval
больше 10 лет назад

ELSA-2015-0895: 389-ds-base security update (IMPORTANT)

EPSS

Процентиль: 62%
0.00432
Низкий

4.8 Medium

CVSS2