![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2014-0132 |
Description: | The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.120360 1.3.6.1.4.1.25623.1.0.123450 1.3.6.1.4.1.25623.1.0.871138 1.3.6.1.4.1.25623.1.0.867602 1.3.6.1.4.1.25623.1.1.10.2014.0145 1.3.6.1.4.1.25623.1.0.881898 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2014-0132 57412 http://secunia.com/advisories/57412 57427 http://secunia.com/advisories/57427 RHSA-2014:0292 http://rhn.redhat.com/errata/RHSA-2014-0292.html https://fedorahosted.org/389/changeset/76acff12a86110d4165f94e2cba13ef5c7ebc38a/ https://fedorahosted.org/389/changeset/76acff12a86110d4165f94e2cba13ef5c7ebc38a/ https://fedorahosted.org/389/ticket/47739 https://fedorahosted.org/389/ticket/47739 |