Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1074845 - (CVE-2014-0132) CVE-2014-0132 389-ds: flaw in parsing authzid can lead to privilege escalation
CVE-2014-0132 389-ds: flaw in parsing authzid can lead to privilege escalation
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
impact=important,public=20140313,repo...
: Security
Depends On: 1074847 1074848 1074850 1076117 1076118
Blocks: 1075158
  Show dependency treegraph
 
Reported: 2014-03-11 01:28 EDT by Vincent Danen
Modified: 2015-10-15 14:16 EDT (History)
10 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2014-05-12 19:04:55 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Knowledge Base (Solution) 769623 None None None Never
Red Hat Product Errata RHSA-2014:0292 normal SHIPPED_LIVE Important: 389-ds-base security update 2014-03-13 19:21:50 EDT

  None (edit)
Description Vincent Danen 2014-03-11 01:28:36 EDT
A flaw was reported [1] in how the 389 Directory Server handled SASL-based authentication, in particular when the authzid parameter is specified.  A flaw in the SASL mechanism handling allowed a user who could legitimately authenticate to the Directory Server, to use the directory as any other user they wished.  This could allow an unprivileged directory user to effectively elevate privileges to the Directory Manager.  This could allow a user to modify configuration values, as well as read and write any data the directory holds.

A patch to correct this flaw is available in git [2].

[1] https://fedorahosted.org/389/ticket/47739
[2] https://fedorahosted.org/389/changeset/76acff12a86110d4165f94e2cba13ef5c7ebc38a/
Comment 4 Vincent Danen 2014-03-13 11:17:09 EDT
Created 389-ds-base tracking bugs for this issue:

Affects: fedora-all [bug 1076117]
Affects: epel-5 [bug 1076118]
Comment 5 errata-xmlrpc 2014-03-13 15:23:10 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2014:0292 https://rhn.redhat.com/errata/RHSA-2014-0292.html
Comment 6 Vincent Danen 2014-05-12 19:04:55 EDT
This has been corrected in EPEL5 via 389-ds-base-1.2.11.28-1.el5, in Fedora 20 via 389-ds-base-1.3.2.16-1.fc20 and in Fedora 19 via 389-ds-base-1.3.1.22-1.fc19.

Note You need to log in before you can comment on or make changes to this bug.