CVE-2014-0132Improper Authentication in 389 Directory Server

Severity
6.5MEDIUMNVD
EPSS
0.6%
top 31.28%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 18
Latest updateMay 17

Description

The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 8.0 | Impact: 6.4

Affected Packages2 packages

Debianport389/389-ds-base< 1.3.2.9-1.1+2

Patches

🔴Vulnerability Details

3
GHSA
GHSA-3483-6grv-x2wh: The SASL authentication functionality in 389 Directory Server before 12022-05-17
OSV
CVE-2014-0132: The SASL authentication functionality in 389 Directory Server before 12014-03-18
CVEList
CVE-2014-0132: The SASL authentication functionality in 389 Directory Server before 12014-03-18

📋Vendor Advisories

2
Red Hat
389-ds: flaw in parsing authzid can lead to privilege escalation2014-03-13
Debian
CVE-2014-0132: 389-ds-base - The SASL authentication functionality in 389 Directory Server before 1.2.11.26 a...2014

💬Community

3
Bugzilla
CVE-2014-0132 389-ds-base: 389-ds: flaw in parsing authzid can lead to privilege escalation [fedora-all]2014-03-13
Bugzilla
CVE-2014-0132 389-ds-base: 389-ds: flaw in parsing authzid can lead to privilege escalation [epel-5]2014-03-13
Bugzilla
CVE-2014-0132 389-ds: flaw in parsing authzid can lead to privilege escalation2014-03-11
CVE-2014-0132 — Improper Authentication | cvebase