Vulnerability Name: | CVE-2014-9713 (CCN-102097) | ||||||||||||||||
Assigned: | 2015-03-28 | ||||||||||||||||
Published: | 2015-03-28 | ||||||||||||||||
Updated: | 2016-12-22 | ||||||||||||||||
Summary: | The default slapd configuration in the Debian openldap package 2.4.23-3 through 2.4.39-1.1 allows remote authenticated users to modify the user's permissions and other user attributes via unspecified vectors. | ||||||||||||||||
CVSS v3 Severity: | 3.5 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N)
| ||||||||||||||||
CVSS v2 Severity: | 4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N) 3.0 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N/E:U/RL:OF/RC:C)
3.0 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N/E:U/RL:OF/RC:C)
| ||||||||||||||||
Vulnerability Type: | CWE-264 | ||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2014-9713 Source: CCN Type: oss-security Mailing List, Sat, 28 Mar 2015 23:52:12 +0100 CVE request (Debian specific): slapd: dangerous access rule in default config Source: CCN Type: oss-security Mailing List, Sun, 29 Mar 2015 02:24:23 -0400 (EDT) Re: CVE request (Debian specific): slapd: dangerous access rule in default config Source: DEBIAN Type: Vendor Advisory DSA-3209 Source: MLIST Type: UNKNOWN [oss-security] 20150329 Re: CVE request (Debian specific): slapd: dangerous access rule in default config Source: BID Type: UNKNOWN 73217 Source: UBUNTU Type: UNKNOWN USN-2742-1 Source: CONFIRM Type: UNKNOWN https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761406 Source: XF Type: UNKNOWN debian-slapd-cve20149713-sec-bypass(102097) Source: CCN Type: Debian Web site Package slapd Source: CCN Type: WhiteSource Vulnerability Database CVE-2014-9713 | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |