Bug 1074845 (CVE-2014-0132) - CVE-2014-0132 389-ds: flaw in parsing authzid can lead to privilege escalation
Summary: CVE-2014-0132 389-ds: flaw in parsing authzid can lead to privilege escalation
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2014-0132
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1074847 1074848 1074850 1076117 1076118
Blocks: 1075158
TreeView+ depends on / blocked
 
Reported: 2014-03-11 05:28 UTC by Vincent Danen
Modified: 2019-09-29 13:14 UTC (History)
10 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-05-12 23:04:55 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Knowledge Base (Solution) 769623 0 None None None Never
Red Hat Product Errata RHSA-2014:0292 0 normal SHIPPED_LIVE Important: 389-ds-base security update 2014-03-13 23:21:50 UTC

Description Vincent Danen 2014-03-11 05:28:36 UTC
A flaw was reported [1] in how the 389 Directory Server handled SASL-based authentication, in particular when the authzid parameter is specified.  A flaw in the SASL mechanism handling allowed a user who could legitimately authenticate to the Directory Server, to use the directory as any other user they wished.  This could allow an unprivileged directory user to effectively elevate privileges to the Directory Manager.  This could allow a user to modify configuration values, as well as read and write any data the directory holds.

A patch to correct this flaw is available in git [2].

[1] https://fedorahosted.org/389/ticket/47739
[2] https://fedorahosted.org/389/changeset/76acff12a86110d4165f94e2cba13ef5c7ebc38a/

Comment 4 Vincent Danen 2014-03-13 15:17:09 UTC
Created 389-ds-base tracking bugs for this issue:

Affects: fedora-all [bug 1076117]
Affects: epel-5 [bug 1076118]

Comment 5 errata-xmlrpc 2014-03-13 19:23:10 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2014:0292 https://rhn.redhat.com/errata/RHSA-2014-0292.html

Comment 6 Vincent Danen 2014-05-12 23:04:55 UTC
This has been corrected in EPEL5 via 389-ds-base-1.2.11.28-1.el5, in Fedora 20 via 389-ds-base-1.3.2.16-1.fc20 and in Fedora 19 via 389-ds-base-1.3.1.22-1.fc19.


Note You need to log in before you can comment on or make changes to this bug.