发布时间 :2002-01-31 00:00:00
修订时间 :2017-10-09 21:30:04

[原文]slapd in OpenLDAP 2.0 through 2.0.19 allows local users, and anonymous users before 2.0.8, to conduct a "replace" action on access controls without any values, which causes OpenLDAP to delete non-mandatory attributes that would otherwise be protected by ACLs.


        OpenLDAP 2.0到2.0.19版本中的slapd存在漏洞。本地用户和2.0.8版本之前的匿名用户在不具有任何值的访问控件上进行"replace"行为,该漏洞导致OpenLDAP删除本应该被ACLs保护的非限制属性。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/o:redhat:linux:7.0Red Hat Linux 7.0
cpe:/o:redhat:linux:7.1Red Hat Linux 7.1
cpe:/o:redhat:linux:7.2Red Hat Linux 7.2

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BID  3945
(UNKNOWN)  XF  openldap-slapd-delete-attributes(7978)

- 漏洞信息

高危 访问验证错误
2002-01-31 00:00:00 2006-11-07 00:00:00
        OpenLDAP 2.0到2.0.19版本中的slapd存在漏洞。本地用户和2.0.8版本之前的匿名用户在不具有任何值的访问控件上进行"replace"行为,该漏洞导致OpenLDAP删除本应该被ACLs保护的非限制属性。

- 公告与补丁

        This vulnerability is eliminated in OpenLDAP 2.0.21. Red Hat and Conectiva have also released upgraded packages.
        It should be noted that Red Hat 7.0 shipped with OpenLDAP version 1.2.11. An update upgraded this to version 2.0.11. Version 1.2.11 is not vulnerable. The newer fix should still be applied even if the 2.0.11 upgrade was not installed. Red Hat 7.1 originally shipped with version 2.0.7. An update upgraded this to version 2.0.11.
        Users of HP Secure Linux 1.0 are advised to upgrade using the fixes supplied by Red Hat (listed below).
        Additional upgrades are available.
        OpenLDAP OpenLDAP 2.0
        OpenLDAP OpenLDAP 2.0.1
        OpenLDAP OpenLDAP 2.0.10
        OpenLDAP OpenLDAP 2.0.11 -9
        OpenLDAP OpenLDAP 2.0.11

- 漏洞信息

OpenLDAP slapd Object Attribute Deletion
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

OpenLDAP slapd contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered by a request to replace an attribute in a user object with an empty attribute. This flaw may lead to a loss of Integrity.

- 时间线

2004-04-08 2002-01-14
2002-01-14 Unknow

- 解决方案

Upgrade to version 2.0.20 or higher, as it has been reported to fix this vulnerability. OpenLDAP, Conectiva, Hewlett-Packard, Mandrake, Red Hat and Caldera have released patches to address this vulnerability.

- 相关参考

- 漏洞作者