4 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:H/Au:N/C:P/I:P/A:N
4.2 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
6.4 Medium
AI Score
Confidence
Low
0.002 Low
EPSS
Percentile
53.4%
libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.
CPE | Name | Operator | Version |
---|---|---|---|
openldap | lt | 2.4.46-10.el8 |
lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
access.redhat.com/errata/RHBA-2019:3674
bugs.openldap.org/show_bug.cgi?id=9266
bugzilla.redhat.com/show_bug.cgi?id=1740070
kc.mcafee.com/corporate/index?page=content&id=SB10365
www.oracle.com/security-alerts/cpuapr2022.html
4 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:H/Au:N/C:P/I:P/A:N
4.2 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
6.4 Medium
AI Score
Confidence
Low
0.002 Low
EPSS
Percentile
53.4%