Bug 1730477 (CVE-2019-13565) - CVE-2019-13565 openldap: ACL restrictions bypass due to sasl_ssf value being set permanently
Summary: CVE-2019-13565 openldap: ACL restrictions bypass due to sasl_ssf value being ...
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2019-13565
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1738898 1738926 1740758
Blocks: 1730478
TreeView+ depends on / blocked
 
Reported: 2019-07-16 20:10 UTC by Pedro Sampaio
Modified: 2023-09-07 20:16 UTC (History)
39 users (show)

Fixed In Version: openldap 2.4.48
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2020-12-10 16:15:55 UTC
Embargoed:


Attachments (Terms of Use)

Description Pedro Sampaio 2019-07-16 20:10:47 UTC
A flaw was found in OpenLDAP before version 2.4.48. An improper authorization issue in cyrus-sasl based SASL mechanisms may lead to ACL bypass.

References:

https://bugzilla.redhat.com/show_bug.cgi?id=1728902

Comment 1 Joshua Padman 2019-08-06 05:33:36 UTC
This vulnerability is out of security support scope for the following product:
 * Red Hat Enterprise Application Platform 5
 * Red Hat JBoss Web Server 2 
 * Red Hat JBoss Core Services

Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details.

Comment 3 Stefan Cornelius 2019-08-08 11:37:10 UTC
Created openldap tracking bugs for this issue:

Affects: fedora-all [bug 1738898]

Comment 16 Doran Moppert 2021-04-14 05:12:07 UTC
Statement:

This issue did not affect the versions of openldap as shipped with Red Hat Enterprise Linux 8, as it only affects the openldap-servers package, which is not shipped.


Note You need to log in before you can comment on or make changes to this bug.