Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-0132

Опубликовано: 18 мар. 2014
Источник: ubuntu
Приоритет: high
EPSS Низкий
CVSS2: 6.5

Описание

The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.

РелизСтатусПримечание
devel

not-affected

1.3.2.16-0ubuntu1
esm-apps/xenial

not-affected

1.3.2.16-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [1.3.2.16-0ubuntu1]]
lucid

DNE

precise

ignored

end of life
precise/esm

DNE

precise was needed
quantal

ignored

end of life
saucy

ignored

end of life
trusty

not-affected

1.3.2.16-0ubuntu1
trusty/esm

DNE

trusty was not-affected [1.3.2.16-0ubuntu1]

Показывать по

Ссылки на источники

EPSS

Процентиль: 68%
0.00573
Низкий

6.5 Medium

CVSS2

Связанные уязвимости

redhat
больше 11 лет назад

The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.

nvd
больше 11 лет назад

The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.

debian
больше 11 лет назад

The SASL authentication functionality in 389 Directory Server before 1 ...

github
больше 3 лет назад

The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.

oracle-oval
больше 11 лет назад

ELSA-2014-0292: 389-ds-base security update (IMPORTANT)

EPSS

Процентиль: 68%
0.00573
Низкий

6.5 Medium

CVSS2