Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 04 Jun 2014 21:48:59 +0000
From:      bz-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 190629] New: authentication bypass in Horde_Ldap
Message-ID:  <bug-190629-13@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=190629

            Bug ID: 190629
           Summary: authentication bypass in Horde_Ldap
           Product: Ports Tree
           Version: Latest
          Hardware: Any
                OS: Any
            Status: Needs Triage
          Severity: Affects Many People
          Priority: ---
         Component: Individual Port(s)
          Assignee: freebsd-ports-bugs@FreeBSD.org
          Reporter: peo@bsdlabs.com

an authentication bypass vulnerability has been discovered in the Horde_Ldap
library that's being used by all components of the Horde project that
communicate with LDAP servers.
A fixed version has been released and everybody using LDAP in their Horde
installations is advised to upgrade to Horde_Ldap 2.0.6 as soon as possible.
So far only certain setups have been confirmed to be exploitable: The system
must use LDAP for authentication, an LDAP user must have been specified for
binding (as opposed to anonymous binding), that LDAP user must have the same
parent DN like the system users, and the attacker must guess the binding user's
name. In this case the attacker can login with the guessed name and an empty
password. Whether this actually allows for further access to data or to the
system, completely depends on the individual setup. It's possible that other
mitigation factors exist though, that haven't been discovered yet.

Thanks to Matthew Daley for detecting and reporting this vulnerability.

-- 
You are receiving this mail because:
You are the assignee for the bug.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-190629-13>