CVE-2014-0132
18.03.2014, 17:02
The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.Enginsight
| Vendor | Product | Version |
|---|---|---|
| fedoraproject | 389_directory_server | 𝑥 ≤ 1.2.11.25 |
| fedoraproject | 389_directory_server | 1.2.11.1 |
| fedoraproject | 389_directory_server | 1.2.11.5 |
| fedoraproject | 389_directory_server | 1.2.11.6 |
| fedoraproject | 389_directory_server | 1.2.11.8 |
| fedoraproject | 389_directory_server | 1.2.11.9 |
| fedoraproject | 389_directory_server | 1.2.11.10 |
| fedoraproject | 389_directory_server | 1.2.11.11 |
| fedoraproject | 389_directory_server | 1.2.11.12 |
| fedoraproject | 389_directory_server | 1.2.11.13 |
| fedoraproject | 389_directory_server | 1.2.11.14 |
| fedoraproject | 389_directory_server | 1.2.11.15 |
| fedoraproject | 389_directory_server | 1.2.11.17 |
| fedoraproject | 389_directory_server | 1.2.11.19 |
| fedoraproject | 389_directory_server | 1.2.11.20 |
| fedoraproject | 389_directory_server | 1.2.11.21 |
| fedoraproject | 389_directory_server | 1.2.11.22 |
| fedoraproject | 389_directory_server | 1.2.11.23 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
References