Date: Wed, 04 Jun 2014 21:48:59 +0000 From: bz-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 190629] New: authentication bypass in Horde_Ldap Message-ID: <bug-190629-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=190629 Bug ID: 190629 Summary: authentication bypass in Horde_Ldap Product: Ports Tree Version: Latest Hardware: Any OS: Any Status: Needs Triage Severity: Affects Many People Priority: --- Component: Individual Port(s) Assignee: freebsd-ports-bugs@FreeBSD.org Reporter: peo@bsdlabs.com an authentication bypass vulnerability has been discovered in the Horde_Ldap library that's being used by all components of the Horde project that communicate with LDAP servers. A fixed version has been released and everybody using LDAP in their Horde installations is advised to upgrade to Horde_Ldap 2.0.6 as soon as possible. So far only certain setups have been confirmed to be exploitable: The system must use LDAP for authentication, an LDAP user must have been specified for binding (as opposed to anonymous binding), that LDAP user must have the same parent DN like the system users, and the attacker must guess the binding user's name. In this case the attacker can login with the guessed name and an empty password. Whether this actually allows for further access to data or to the system, completely depends on the individual setup. It's possible that other mitigation factors exist though, that haven't been discovered yet. Thanks to Matthew Daley for detecting and reporting this vulnerability. -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-190629-13>