CVE-2015-1854

Published: 19 September 2017

389 Directory Server before 1.3.3.10 allows attackers to bypass intended access restrictions and modify directory entries via a crafted ldapmodrdn call.

Priority

Medium

CVSS 3 base score: 7.5

Status

Package Release Status
389-ds-base
Launchpad, Ubuntu, Debian
Upstream
Released (1.3.3.10-1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable

Ubuntu 16.04 LTS (Xenial Xerus) Not vulnerable

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was not-affected)
Patches:
Other: https://pagure.io/389-ds-base/c/19d8b6312f0b654a403c1d13936b3a9e50fe2ce2

Notes

AuthorNote
leosilva
for trusty, patch already present except for the tests.

References