Improper Authentication in OpenLDAP - CVE-2011-1025
Published: March 20, 2011 / Updated: August 11, 2020
Vulnerability identifier: #VU45195
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2011-1025
CWE-ID: CWE-287
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: OpenLDAP.org
Affected software:
OpenLDAP
OpenLDAP
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
bind.cpp in back-ndb in OpenLDAP 2.4.x before 2.4.24 does not require authentication for the root Distinguished Name (DN), which allows remote attackers to bypass intended access restrictions via an arbitrary password.
How to mitigate CVE-2011-1025
Install update from vendor's website.
Sources
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://openwall.com/lists/oss-security/2011/02/24/12
- http://openwall.com/lists/oss-security/2011/02/25/13
- http://secunia.com/advisories/43331
- http://secunia.com/advisories/43718
- http://security.gentoo.org/glsa/glsa-201406-36.xml
- http://securitytracker.com/id?1025190
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:056
- http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-ndb/bind.cpp.diff?r1=1.5&r2=1.8
- http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6661
- http://www.openldap.org/lists/openldap-announce/201102/msg00000.html
- http://www.redhat.com/support/errata/RHSA-2011-0347.html
- http://www.ubuntu.com/usn/USN-1100-1
- http://www.vupen.com/english/advisories/2011/0665
- https://bugzilla.redhat.com/show_bug.cgi?id=680472