Логотип exploitDog
bind:CVE-2019-13565
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-13565

Количество 12

Количество 12

ubuntu логотип

CVE-2019-13565

больше 6 лет назад

An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2019-13565

больше 6 лет назад

An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user.

CVSS3: 7.4
EPSS: Низкий
nvd логотип

CVE-2019-13565

больше 6 лет назад

An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2019-13565

больше 6 лет назад

An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-49q9-mmpr-r526

больше 3 лет назад

An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2019-02876

больше 6 лет назад

Уязвимость пакета OpenLDAP, связанная с ошибками реализации процедуры аутентификации, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:14353-1

почти 6 лет назад

Security update for openldap2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2390-1

больше 6 лет назад

Security update for openldap2

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2176-1

больше 6 лет назад

Security update for openldap2

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2157-1

больше 6 лет назад

Security update for openldap2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1210-1

почти 6 лет назад

Security update for openldap2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2395-1

больше 6 лет назад

Security update for openldap2

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-13565

An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user.

CVSS3: 7.5
3%
Низкий
больше 6 лет назад
redhat логотип
CVE-2019-13565

An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user.

CVSS3: 7.4
3%
Низкий
больше 6 лет назад
nvd логотип
CVE-2019-13565

An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user.

CVSS3: 7.5
3%
Низкий
больше 6 лет назад
debian логотип
CVE-2019-13565

An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL ...

CVSS3: 7.5
3%
Низкий
больше 6 лет назад
github логотип
GHSA-49q9-mmpr-r526

An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user.

CVSS3: 7.5
3%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-02876

Уязвимость пакета OpenLDAP, связанная с ошибками реализации процедуры аутентификации, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 7.5
3%
Низкий
больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:14353-1

Security update for openldap2

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:2390-1

Security update for openldap2

больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2176-1

Security update for openldap2

больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2157-1

Security update for openldap2

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:1210-1

Security update for openldap2

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:2395-1

Security update for openldap2

больше 6 лет назад

Уязвимостей на страницу