| Vulnerability Name: | CVE-2012-4450 (CCN-78876) | ||||||||||||||||||||||||||||||||
| Assigned: | 2012-04-16 | ||||||||||||||||||||||||||||||||
| Published: | 2012-04-16 | ||||||||||||||||||||||||||||||||
| Updated: | 2013-03-08 | ||||||||||||||||||||||||||||||||
| Summary: | 389 Directory Server 1.2.10 does not properly update the ACL when a DN entry is moved by a modrdn operation, which allows remote authenticated users with certain permissions to bypass ACL restrictions and access the DN entry. | ||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 6.0 Medium (CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P) 4.4 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P/E:U/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
4.3 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-264 | ||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2012-4450 Source: CCN Type: 389 Directory Server GIT Repository 389 Directory Server Source: CONFIRM Type: Patch, Vendor Advisory http://git.fedorahosted.org/cgit/389/ds.git/commit/?id=5beb93d42efb807838c09c5fab898876876f8d09 Source: CCN Type: RHSA-2013-0503 Moderate: 389-ds-base security, bug fix, and enhancement update Source: REDHAT Type: UNKNOWN RHSA-2013:0503 Source: CCN Type: SA50713 389 Directory Server "modifyRDN" ACL Bypass Vulnerability Source: SECUNIA Type: Vendor Advisory 50713 Source: MLIST Type: UNKNOWN [oss-security] 20120926 CVE Request -- 389-ds-base: Change on SLAPI_MODRDN_NEWSUPERIOR is not evaluated in ACL (ACL rules bypass possible) Source: MLIST Type: UNKNOWN [oss-security] 20120926 Re: CVE Request -- 389-ds-base: Change on SLAPI_MODRDN_NEWSUPERIOR is not evaluated in ACL (ACL rules bypass possible) Source: CCN Type: OSVDB ID: 85772 389 Directory Server modifyRDN Operation Handling ACL Bypass Source: BID Type: UNKNOWN 55690 Source: CCN Type: BID-55690 389 Directory Server Access Bypass Vulnerability Source: MISC Type: UNKNOWN https://bugzilla.redhat.com/show_bug.cgi?id=860772 Source: XF Type: UNKNOWN 389directory-modifyrdn-sec-bypass(78876) Source: CCN Type: Fedora Ticket #340 Change on SLAPI_MODRDN_NEWSUPERIOR is not evaluated in acl Source: CONFIRM Type: UNKNOWN https://fedorahosted.org/389/ticket/340 | ||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||