389-ds-base version before 1.3.5.19 and 1.3.6.7 are vulnerable to password brute-force attacks during account lockout due to different return codes returned on password attempts.
The product generates an error message that includes sensitive information about its environment, users, or associated data.
The product contains a mechanism for users to recover or change their passwords without knowing the original password, but the mechanism is weak.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2017:2569 | vendor advisory |
https://pagure.io/389-ds-base/issue/49336 | exploit third party advisory patch |