4.6
CVSSv2

CVE-2011-1024

Published: 20/03/2011 Updated: 07/01/2017
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
VMScore: 409
Vector: AV:N/AC:H/Au:S/C:P/I:P/A:P

Vulnerability Summary

chain.c in back-ldap in OpenLDAP 2.4.x prior to 2.4.24, when a master-slave configuration with a chain overlay and ppolicy_forward_updates (aka authentication-failure forwarding) is used, allows remote authenticated users to bypass external-program authentication by sending an invalid password to a slave server.

Vulnerable Product Search on Vulmon Subscribe to Product

openldap openldap 2.4.10

openldap openldap 2.4.6

openldap openldap 2.4.14

openldap openldap 2.4.15

openldap openldap 2.4.16

openldap openldap 2.4.22

openldap openldap 2.4.12

openldap openldap 2.4.13

openldap openldap 2.4.21

openldap openldap 2.4.23

openldap openldap 2.4.7

openldap openldap 2.4.8

openldap openldap 2.4.17

openldap openldap 2.4.18

openldap openldap 2.4.9

openldap openldap 2.4.11

openldap openldap 2.4.19

openldap openldap 2.4.20

Vendor Advisories

Debian Bug report logs - #617606 CVE-2011-1024 CVE-2011-1025 Package: openldap; Maintainer for openldap is Debian OpenLDAP Maintainers <pkg-openldap-devel@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Wed, 9 Mar 2011 21:45:05 UTC Severity: important Tags: security Found in version ...
An attacker could send crafted input to OpenLDAP and cause it to crash ...