vulnerability

SUSE: CVE-2019-13565: SUSE Linux Security Advisory

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
Jul 26, 2019
Added
Sep 18, 2019
Modified
Oct 22, 2021

Description

An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user.

Solution(s)

suse-upgrade-compat-libldap-2_3-0suse-upgrade-libldap-2_4-2suse-upgrade-libldap-2_4-2-32bitsuse-upgrade-libldap-datasuse-upgrade-libldap-openssl1-2_4-2suse-upgrade-libldap-openssl1-2_4-2-32bitsuse-upgrade-libldap-openssl1-2_4-2-x86suse-upgrade-openldap2suse-upgrade-openldap2-back-metasuse-upgrade-openldap2-back-perlsuse-upgrade-openldap2-back-socksuse-upgrade-openldap2-back-sqlsuse-upgrade-openldap2-clientsuse-upgrade-openldap2-client-openssl1suse-upgrade-openldap2-contribsuse-upgrade-openldap2-develsuse-upgrade-openldap2-devel-32bitsuse-upgrade-openldap2-devel-staticsuse-upgrade-openldap2-docsuse-upgrade-openldap2-openssl1suse-upgrade-openldap2-ppolicy-check-password
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.