发布时间: 2022年6月20日
修改时间: 2022年6月20日
A flaw was found in 389-ds-base. If an asterisk is imported as password hashes, either accidentally or maliciously, then instead of being inactive, any password will successfully match during authentication. This flaw allows an attacker to successfully authenticate as a user whose password was disabled.
NVD | openEuler | |
---|---|---|
Confidentiality | High | Low |
Attack Vector | Network | Network |
CVSS评分 | 9.8 | 6.5 |
Attack Complexity | Low | Low |
Privileges Required | None | None |
Scope | Unchanged | Unchanged |
Integrity | High | Low |
User Interaction | None | None |
Availability | High | None |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2022-1539 | A flaw was found in 389-ds-base. If an asterisk is imported as password hashes, either accidentally or maliciously, then instead of being inactive, any password will successfully match during authentication. This flaw allows an attacker to successfully authenticate as a user whose password was disabled. | 2022年6月20日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | three-eight-nine-ds-base | Unaffected |
KY3.4-5A | three-eight-nine-ds-base | Unaffected |
KY3.5.1 | three-eight-nine-ds-base | Unaffected |