DBMail before 2.2.9, when using authldap with an LDAP server that supports anonymous login such as Active Directory, allows remote attackers to bypass authentication via an empty password, which causes the LDAP bind to indicate success based on anonymous authentication.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://www.gentoo.org/security/en/glsa/glsa-200804-24.xml | vendor advisory |
http://www.securityfocus.com/bid/28849 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41907 | vdb entry |
http://osvdb.org/44561 | vdb entry |
http://secunia.com/advisories/29903 | third party advisory |
http://www.securitytracker.com/id?1019914 | vdb entry |
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00549.html | vendor advisory |
http://secunia.com/advisories/29984 | third party advisory |
http://www.vupen.com/english/advisories/2008/1321/references | vdb entry |
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00585.html | vendor advisory |
http://secunia.com/advisories/29937 | third party advisory |
http://www.mail-archive.com/dbmail-dev%40dbmail.org/msg09942.html | mailing list |
http://dbmail.org/index.php?page=news&id=44 | patch |