Vulnerability Name:

CVE-2011-1024 (CCN-65391)

Assigned:2010-07-28
Published:2010-07-28
Updated:2017-01-07
Summary:chain.c in back-ldap in OpenLDAP 2.4.x before 2.4.24, when a master-slave configuration with a chain overlay and ppolicy_forward_updates (aka authentication-failure forwarding) is used, allows remote authenticated users to bypass external-program authentication by sending an invalid password to a slave server.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.6 Medium (CVSS v2 Vector: AV:N/AC:H/Au:S/C:P/I:P/A:P)
3.4 Low (Temporal CVSS v2 Vector: AV:N/AC:H/Au:S/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
5.1 Medium (REDHAT CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
3.8 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-264
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2011-1024

Source: CONFIRM
Type: UNKNOWN
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705

Source: CONFIRM
Type: UNKNOWN
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735

Source: MLIST
Type: UNKNOWN
[oss-security] 20110224 CVE Request -- OpenLDAP -- two issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110225 Re: CVE Request -- OpenLDAP -- two issues

Source: CCN
Type: RHSA-2011-0346
Moderate: openldap security and bug fix update

Source: CCN
Type: RHSA-2011-0347
Moderate: openldap security update

Source: CCN
Type: SA43331
OpenLDAP Two Security Bypass Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
43331

Source: SECUNIA
Type: UNKNOWN
43708

Source: SECUNIA
Type: UNKNOWN
43718

Source: GENTOO
Type: UNKNOWN
GLSA-201406-36

Source: SECTRACK
Type: UNKNOWN
1025188

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2011:055

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2011:056

Source: CONFIRM
Type: Patch
http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-ldap/chain.c.diff?r1=1.76&r2=1.77&hideattic=1&sortbydate=0

Source: CCN
Type: OpenLDAP Web site
forwarded bind failure messages cause success

Source: CONFIRM
Type: UNKNOWN
http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6607

Source: MLIST
Type: Patch
[openldap-announce] 20110212 OpenLDAP 2.4.24 available

Source: MLIST
Type: UNKNOWN
[openldap-technical] 20100429 ppolicy master/slave issue

Source: CCN
Type: OSVDB ID: 72528
OpenLDAP back-ldap chain.c Slave Server Invalid Password External-program Authentication Bypass

Source: REDHAT
Type: UNKNOWN
RHSA-2011:0346

Source: REDHAT
Type: UNKNOWN
RHSA-2011:0347

Source: CCN
Type: BID-46363
OpenLDAP Multiple Security Bypass Vulnerabilities

Source: UBUNTU
Type: UNKNOWN
USN-1100-1

Source: VUPEN
Type: Vendor Advisory
ADV-2011-0665

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.novell.com/show_bug.cgi?id=674985

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=680466

Source: XF
Type: UNKNOWN
openldap-backldap-security-bypass(65391)

Source: SUSE
Type: SUSE-SR:2011:007
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:openldap:openldap:2.4.6:*:*:*:*:*:*:*
  • OR cpe:/a:openldap:openldap:2.4.7:*:*:*:*:*:*:*
  • OR cpe:/a:openldap:openldap:2.4.8:*:*:*:*:*:*:*
  • OR cpe:/a:openldap:openldap:2.4.9:*:*:*:*:*:*:*
  • OR cpe:/a:openldap:openldap:2.4.10:*:*:*:*:*:*:*
  • OR cpe:/a:openldap:openldap:2.4.11:*:*:*:*:*:*:*
  • OR cpe:/a:openldap:openldap:2.4.12:*:*:*:*:*:*:*
  • OR cpe:/a:openldap:openldap:2.4.13:*:*:*:*:*:*:*
  • OR cpe:/a:openldap:openldap:2.4.14:*:*:*:*:*:*:*
  • OR cpe:/a:openldap:openldap:2.4.15:*:*:*:*:*:*:*
  • OR cpe:/a:openldap:openldap:2.4.16:*:*:*:*:*:*:*
  • OR cpe:/a:openldap:openldap:2.4.17:*:*:*:*:*:*:*
  • OR cpe:/a:openldap:openldap:2.4.18:*:*:*:*:*:*:*
  • OR cpe:/a:openldap:openldap:2.4.19:*:*:*:*:*:*:*
  • OR cpe:/a:openldap:openldap:2.4.20:*:*:*:*:*:*:*
  • OR cpe:/a:openldap:openldap:2.4.21:*:*:*:*:*:*:*
  • OR cpe:/a:openldap:openldap:2.4.22:*:*:*:*:*:*:*
  • OR cpe:/a:openldap:openldap:2.4.23:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:openldap:openldap:2.4.23:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6:*:server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_eus:5.6.z::server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_long_life:5.6:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20111024
    V
    CVE-2011-1024
    2022-05-20
    oval:org.mitre.oval:def:13722
    P
    USN-1100-1 -- openldap, openldap2.3 vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:22679
    P
    ELSA-2011:0347: openldap security update (Moderate)
    2014-05-26
    oval:org.mitre.oval:def:23088
    P
    ELSA-2011:0346: openldap security and bug fix update (Moderate)
    2014-05-26
    oval:org.mitre.oval:def:21865
    P
    RHSA-2011:0346: openldap security and bug fix update (Moderate)
    2014-02-24
    oval:org.mitre.oval:def:21750
    P
    RHSA-2011:0347: openldap security update (Moderate)
    2014-02-24
    oval:com.redhat.rhsa:def:20110346
    P
    RHSA-2011:0346: openldap security and bug fix update (Moderate)
    2011-03-10
    oval:com.redhat.rhsa:def:20110347
    P
    RHSA-2011:0347: openldap security update (Moderate)
    2011-03-10
    BACK
    openldap openldap 2.4.6
    openldap openldap 2.4.7
    openldap openldap 2.4.8
    openldap openldap 2.4.9
    openldap openldap 2.4.10
    openldap openldap 2.4.11
    openldap openldap 2.4.12
    openldap openldap 2.4.13
    openldap openldap 2.4.14
    openldap openldap 2.4.15
    openldap openldap 2.4.16
    openldap openldap 2.4.17
    openldap openldap 2.4.18
    openldap openldap 2.4.19
    openldap openldap 2.4.20
    openldap openldap 2.4.21
    openldap openldap 2.4.22
    openldap openldap 2.4.23
    openldap openldap 2.4.23
    redhat enterprise linux 5
    redhat enterprise linux 5
    redhat enterprise linux 5
    redhat enterprise linux 6
    redhat enterprise linux 6
    redhat enterprise linux desktop 6
    redhat enterprise linux hpc node 6
    redhat enterprise linux eus 5.6.z
    redhat enterprise linux long life 5.6