Vulnerability identifier: #VU45195
Vulnerability risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2011-1025
CWE-ID:
CWE-287
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
OpenLDAP
Server applications /
Directory software, identity management
Vendor: OpenLDAP.org
Description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
bind.cpp in back-ndb in OpenLDAP 2.4.x before 2.4.24 does not require authentication for the root Distinguished Name (DN), which allows remote attackers to bypass intended access restrictions via an arbitrary password.
Mitigation
Install update from vendor's website.
Vulnerable software versions
OpenLDAP: 2.4.6 - 2.4.23
External links
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
https://openwall.com/lists/oss-security/2011/02/24/12
https://openwall.com/lists/oss-security/2011/02/25/13
https://secunia.com/advisories/43331
https://secunia.com/advisories/43718
https://security.gentoo.org/glsa/glsa-201406-36.xml
https://securitytracker.com/id?1025190
https://www.mandriva.com/security/advisories?name=MDVSA-2011:056
https://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-ndb/bind.cpp.diff?r1=1.5&r2=1.8
https://www.openldap.org/its/index.cgi/Software%20Bugs?id=6661
https://www.openldap.org/lists/openldap-announce/201102/msg00000.html
https://www.redhat.com/support/errata/RHSA-2011-0347.html
https://www.ubuntu.com/usn/USN-1100-1
https://www.vupen.com/english/advisories/2011/0665
https://bugzilla.redhat.com/show_bug.cgi?id=680472
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.