CVE Vulnerabilities

CVE-2019-13057

Published: Jul 26, 2019 | Modified: Nov 21, 2024
CVSS 3.x
4.9
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
3.5 LOW
AV:N/AC:M/Au:S/C:P/I:N/A:N
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

An issue was discovered in the server in OpenLDAP before 2.4.48. When the server administrator delegates rootDN (database admin) privileges for certain databases but wants to maintain isolation (e.g., for multi-tenant deployments), slapd does not properly stop a rootDN from requesting authorization as an identity from another database during a SASL bind or with a proxyAuthz (RFC 4370) control. (It is not a common configuration to deploy a system where the server administrator and a DB administrator enjoy different levels of trust.)

Affected Software

NameVendorStart VersionEnd Version
OpenldapOpenldap*2.4.48 (excluding)
OpenldapUbuntubionic*
OpenldapUbuntudevel*
OpenldapUbuntudisco*
OpenldapUbuntuesm-infra-legacy/trusty*
OpenldapUbuntuesm-infra/bionic*
OpenldapUbuntuesm-infra/xenial*
OpenldapUbuntutrusty*
OpenldapUbuntutrusty/esm*
OpenldapUbuntuupstream*
OpenldapUbuntuxenial*

References