CVE-2014-0132
The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.
Ver en NVDSeveridad
N/A
EPSS
Probabilidad de explotación (próx. 30 días): 0.0057 (0.6%)
Percentil: 68.8%
EPSS: 2026-05-06
Afecta
fedoraproject:389_directory_serverDescripción técnica
The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.
Publicada: 18/3/2014, 17:02:53
Última modificación: 6/5/2026, 22:30:45
Referencias
- http://rhn.redhat.com/errata/RHSA-2014-0292.html
- http://secunia.com/advisories/57412
- http://secunia.com/advisories/57427
- https://fedorahosted.org/389/changeset/76acff12a86110d4165f94e2cba13ef5c7ebc38a/
- https://fedorahosted.org/389/ticket/47739
- http://rhn.redhat.com/errata/RHSA-2014-0292.html
- http://secunia.com/advisories/57412
- http://secunia.com/advisories/57427