#VU45195 Improper Authentication in OpenLDAP - CVE-2011-1025


| Updated: 2020-08-11

Vulnerability identifier: #VU45195

Vulnerability risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2011-1025

CWE-ID: CWE-287

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
OpenLDAP
Server applications / Directory software, identity management

Vendor: OpenLDAP.org

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

bind.cpp in back-ndb in OpenLDAP 2.4.x before 2.4.24 does not require authentication for the root Distinguished Name (DN), which allows remote attackers to bypass intended access restrictions via an arbitrary password.

Mitigation
Install update from vendor's website.

Vulnerable software versions

OpenLDAP: 2.4.6 - 2.4.23


External links
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
https://openwall.com/lists/oss-security/2011/02/24/12
https://openwall.com/lists/oss-security/2011/02/25/13
https://secunia.com/advisories/43331
https://secunia.com/advisories/43718
https://security.gentoo.org/glsa/glsa-201406-36.xml
https://securitytracker.com/id?1025190
https://www.mandriva.com/security/advisories?name=MDVSA-2011:056
https://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-ndb/bind.cpp.diff?r1=1.5&r2=1.8
https://www.openldap.org/its/index.cgi/Software%20Bugs?id=6661
https://www.openldap.org/lists/openldap-announce/201102/msg00000.html
https://www.redhat.com/support/errata/RHSA-2011-0347.html
https://www.ubuntu.com/usn/USN-1100-1
https://www.vupen.com/english/advisories/2011/0665
https://bugzilla.redhat.com/show_bug.cgi?id=680472


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability