CVE Vulnerabilities

CVE-2014-3999

Improper Authentication

Published: Apr 10, 2018 | Modified: Nov 21, 2024
CVSS 3.x
8.1
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The Horde_Ldap library before 2.0.6 for Horde allows remote attackers to bypass authentication by leveraging knowledge of the LDAP bind user DN.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

NameVendorStart VersionEnd Version
Horde_ldapHorde*2.0.6 (excluding)
Php-horde-ldapUbuntuartful*
Php-horde-ldapUbuntusaucy*
Php-horde-ldapUbuntutrusty*
Php-horde-ldapUbuntuupstream*
Php-horde-ldapUbuntuutopic*
Php-horde-ldapUbuntuvivid*
Php-horde-ldapUbuntuwily*
Php-horde-ldapUbuntuyakkety*
Php-horde-ldapUbuntuzesty*

Potential Mitigations

References