CVE-2020-15719

EUVD-2020-7705
libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4.2 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 43%
Affected Products (NVD)
VendorProductVersion
openldapopenldap
𝑥
< 2.4.46-10.el8
redhatenterprise_linux
8.0
opensuseleap
15.1
opensuseleap
15.2
mcafeepolicy_auditor
𝑥
< 6.5.1
oracleblockchain_platform
𝑥
< 21.1.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openldap
bookworm
unimportant
bullseye
unimportant
bullseye (security)
unimportant
sid
unimportant
trixie
unimportant
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openldap
bionic
not-affected
eoan
ignored
focal
not-affected
trusty
not-affected
xenial
not-affected