| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.5 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as critical, was found in OpenLDAP. This vulnerability affects unknown code of the file chain.c. Executing a manipulation can lead to access control. The identification of this vulnerability is CVE-2011-1024. There is no exploit available. You should upgrade the affected component.
Details
A vulnerability has been found in OpenLDAP (Directory Service Software) and classified as critical. This vulnerability affects some unknown functionality of the file chain.c. The manipulation with an unknown input leads to a access control vulnerability. The CWE definition for the vulnerability is CWE-264. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
chain.c in back-ldap in OpenLDAP 2.4.x before 2.4.24, when a master-slave configuration with a chain overlay and ppolicy_forward_updates (aka authentication-failure forwarding) is used, allows remote authenticated users to bypass external-program authentication by sending an invalid password to a slave server.
The weakness was shared 03/19/2011 (Website). The advisory is shared for download at openldap.org. This vulnerability was named CVE-2011-1024 since 02/14/2011. The exploitation appears to be difficult. The attack can be initiated remotely. A single authentication is required for exploitation. There are known technical details, but no exploit is available. The MITRE ATT&CK project declares the attack technique as T1068.
It is declared as proof-of-concept. The vulnerability scanner Nessus provides a plugin with the ID 75686 (openSUSE Security Update : openldap2 (openSUSE-SU-2011:0359-1)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family SuSE Local Security Checks. The commercial vulnerability scanner Qualys is able to test this issue with plugin 155470 (Oracle Enterprise Linux Update for OpenLDAP (ELSA-2011-0347)).
Upgrading to version 2.4.22 eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (65391), Tenable (75686), SecurityFocus (BID 46363†), Secunia (SA43331†) and SecurityTracker (ID 1025188†). The entries VDB-56887 and VDB-56885 are related to this item. Once again VulDB remains the best source for vulnerability data.
Product
Type
Name
Version
- 2.4.6
- 2.4.7
- 2.4.8
- 2.4.9
- 2.4.10
- 2.4.11
- 2.4.12
- 2.4.13
- 2.4.14
- 2.4.15
- 2.4.16
- 2.4.17
- 2.4.18
- 2.4.19
- 2.4.20
- 2.4.21
- 2.4.22
- 2.4.23
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.0VulDB Meta Temp Score: 4.5
VulDB Base Score: 5.0
VulDB Temp Score: 4.5
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Access controlCWE: CWE-264
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 75686
Nessus Name: openSUSE Security Update : openldap2 (openSUSE-SU-2011:0359-1)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Port: 🔍
OpenVAS ID: 68939
OpenVAS Name: FreeBSD Ports: openldap-server
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: OpenLDAP 2.4.22
Timeline
09/29/2010 🔍02/14/2011 🔍
02/14/2011 🔍
02/14/2011 🔍
03/10/2011 🔍
03/15/2011 🔍
03/19/2011 🔍
03/19/2011 🔍
06/13/2014 🔍
03/20/2015 🔍
10/19/2021 🔍
Sources
Advisory: USN-1100-1Status: Confirmed
Confirmation: 🔍
CVE: CVE-2011-1024 (🔍)
GCVE (CVE): GCVE-0-2011-1024
GCVE (VulDB): GCVE-100-56884
OVAL: 🔍
X-Force: 65391
SecurityFocus: 46363 - OpenLDAP Multiple Security Bypass Vulnerabilities
Secunia: 43331 - OpenLDAP Multiple Vulnerabilities, Less Critical
SecurityTracker: 1025188 - OpenLDAP Forwarding Error May Let Remote Users Bypass Authentication for External Applications
Vulnerability Center: 30360 - OpenLDAP before 2.4.24 Remote Security Bypass Vulnerability, Medium
Vupen: ADV-2011-0665
See also: 🔍
Entry
Created: 03/20/2015 16:16Updated: 10/19/2021 23:23
Changes: 03/20/2015 16:16 (66), 03/19/2017 07:48 (18), 10/19/2021 23:01 (3), 10/19/2021 23:10 (1), 10/19/2021 23:23 (1)
Complete: 🔍
Cache ID: 216:3E0:103
Once again VulDB remains the best source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.