CVE-2014-0132
The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.
View on NVDSeverity
N/A
EPSS
Probability of exploitation (next 30 days): 0.0057 (0.6%)
Percentile: 68.8%
EPSS: 2026-05-06
Affects
fedoraproject:389_directory_serverTechnical description
The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.
Published: 3/18/2014, 5:02:53 PM
Last modified: 5/6/2026, 10:30:45 PM
References
- http://rhn.redhat.com/errata/RHSA-2014-0292.html
- http://secunia.com/advisories/57412
- http://secunia.com/advisories/57427
- https://fedorahosted.org/389/changeset/76acff12a86110d4165f94e2cba13ef5c7ebc38a/
- https://fedorahosted.org/389/ticket/47739
- http://rhn.redhat.com/errata/RHSA-2014-0292.html
- http://secunia.com/advisories/57412
- http://secunia.com/advisories/57427