The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://fedorahosted.org/389/changeset/76acff12a86110d4165f94e2cba13ef5c7ebc38a/ | exploit |
http://secunia.com/advisories/57427 | third party advisory vendor advisory |
http://rhn.redhat.com/errata/RHSA-2014-0292.html | vendor advisory |
http://secunia.com/advisories/57412 | third party advisory vendor advisory |
https://fedorahosted.org/389/ticket/47739 | patch |