A flaw was found in RHDS 11 and RHDS 12. While browsing entries LDAP tries to decode the userPassword attribute instead of the userCertificate attribute which could lead into sensitive information leaked. An attacker with a local account where the cockpit-389-ds is running can list the processes and display the hashed passwords. The highest threat from this vulnerability is to data confidentiality.
The product does not validate, or incorrectly validates, a certificate.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Directory_server | Redhat | 11.5 (including) | 11.5 (including) |
Directory_server | Redhat | 11.6 (including) | 11.6 (including) |
Directory_server | Redhat | 12.0 (including) | 12.0 (including) |
Directory_server | Redhat | 12.1 (including) | 12.1 (including) |
Red Hat Directory Server 11.6 for RHEL 8 | RedHat | redhat-ds:11-8070020230314201033.95958119 | * |
Red Hat Directory Server 12.1 for RHEL 9 | RedHat | redhat-ds:12-9010020230314160305.1674d574 | * |
389-ds-base | Ubuntu | bionic | * |
389-ds-base | Ubuntu | kinetic | * |
389-ds-base | Ubuntu | lunar | * |
389-ds-base | Ubuntu | mantic | * |
389-ds-base | Ubuntu | trusty | * |
389-ds-base | Ubuntu | xenial | * |