Lucene search

K
nvd[email protected]NVD:CVE-2019-13565
HistoryJul 26, 2019 - 1:15 p.m.

CVE-2019-13565

2019-07-2613:15:12
web.nvd.nist.gov

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.5 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

52.4%

An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user.

Affected configurations

NVD
Node
openldapopenldapRange2.02.4.47
Node
canonicalubuntu_linuxMatch12.04esm
OR
canonicalubuntu_linuxMatch14.04esm
OR
canonicalubuntu_linuxMatch16.04lts
OR
canonicalubuntu_linuxMatch18.04
OR
canonicalubuntu_linuxMatch19.04
Node
debiandebian_linuxMatch8.0
Node
opensuseleapMatch15.0
OR
opensuseleapMatch15.1
Node
f5traffix_signaling_delivery_controllerMatch5.0.0
OR
f5traffix_signaling_delivery_controllerMatch5.1.0
Node
applemac_os_xRange10.1310.13.6
OR
applemac_os_xRange10.1410.14.6
OR
applemac_os_xRange10.1510.15.2
OR
applemac_os_xMatch10.13.6
OR
applemac_os_xMatch10.13.6-
OR
applemac_os_xMatch10.13.6security_update_2018-002
OR
applemac_os_xMatch10.13.6security_update_2018-003
OR
applemac_os_xMatch10.13.6security_update_2019-001
OR
applemac_os_xMatch10.13.6security_update_2019-002
OR
applemac_os_xMatch10.13.6security_update_2019-003
OR
applemac_os_xMatch10.13.6security_update_2019-004
OR
applemac_os_xMatch10.13.6security_update_2019-005
OR
applemac_os_xMatch10.13.6security_update_2019-006
OR
applemac_os_xMatch10.14.6-
OR
applemac_os_xMatch10.14.6security_update_2019-001
Node
oracleblockchain_platformRange<21.1.2
OR
oraclezfs_storage_appliance_kitMatch8.8
OR
oraclesolarisMatch11

References

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.5 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

52.4%