Bug 236384 - CVE-2006-4600 openldap improper selfwrite access
CVE-2006-4600 openldap improper selfwrite access
Status: CLOSED WONTFIX
Product: Red Hat Enterprise Linux 2.1
Classification: Red Hat
Component: openldap (Show other bugs)
2.1
All Linux
medium Severity low
: ---
: ---
Assigned To: Jan Safranek
reported=20060906,source=cve,impact=l...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2007-04-13 11:17 EDT by Josh Bressers
Modified: 2007-11-30 17:06 EST (History)
3 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2007-09-05 16:39:43 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:


Attachments (Terms of Use)

  None (edit)
Description Josh Bressers 2007-04-13 11:17:33 EDT
+++ This bug was initially created as a clone of Bug #205826 +++

openldap improper selfwrite access

The way openldap handles selfwrite access is broken.  Users with
selfwrite access should only be able to add/remove their own DN to the
target, but via this bug any DN may be modified.

This was fixed upstream in version 2.3.25
http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4587
http://secunia.com/advisories/21721/

A reproducer can be found here:
http://www.openldap.org/devel/cvsweb.cgi/tests/scripts/test006-acls?hideattic=1&sortbydate=0
Comment 1 Josh Bressers 2007-09-05 16:39:43 EDT
This flaw has been rated as having a low severity by the Red Hat Security
Response Team.  More information about this rating can be
found here: http://www.redhat.com/security/updates/classification/

The risks associated with fixing this bug are greater than the low severity
security risk. We therefore currently have no plans to fix this flaw in Red Hat
Enterprise Linux 2.1 which is in maintenance mode.

If you believe this judgement to be in error, please reopen this bug with an
appropriate comment.

Note You need to log in before you can comment on or make changes to this bug.