CVE Vulnerabilities

CVE-2021-3652

Published: Apr 18, 2022 | Modified: Apr 24, 2023
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CVSS 2.x
6.4 MEDIUM
AV:N/AC:L/Au:N/C:P/I:P/A:N
RedHat/V2
RedHat/V3
6.5 LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Ubuntu
LOW

A flaw was found in 389-ds-base. If an asterisk is imported as password hashes, either accidentally or maliciously, then instead of being inactive, any password will successfully match during authentication. This flaw allows an attacker to successfully authenticate as a user whose password was disabled.

Affected Software

Name Vendor Start Version End Version
389-ds-base Port389 * 2.0.7 (excluding)
Red Hat Directory Server 11.4 for RHEL 8 RedHat redhat-ds:11-8050020210920153716.d3df4063 *
Red Hat Enterprise Linux 7 RedHat 389-ds-base-0:1.3.10.2-13.el7_9 *
Red Hat Enterprise Linux 8 RedHat 389-ds:1.4-8040020210721074904.96015a92 *
Red Hat Enterprise Linux 8.2 Extended Update Support RedHat 389-ds:1.4-8020020210819193832.dbc46ba7 *
389-ds-base Ubuntu upstream *

References