• 公告ID (KylinSec-SA-2022-1539)

摘要:

A flaw was found in 389-ds-base. If an asterisk is imported as password hashes, either accidentally or maliciously, then instead of being inactive, any password will successfully match during authentication. This flaw allows an attacker to successfully authenticate as a user whose password was disabled.

安全等级: Low

公告ID: KylinSec-SA-2022-1539

发布日期: 2022年6月20日

关联CVE: CVE-2021-3652  

  • 详细介绍

1. 漏洞描述

   

A flaw was found in 389-ds-base. If an asterisk is imported as password hashes, either accidentally or maliciously, then instead of being inactive, any password will successfully match during authentication. This flaw allows an attacker to successfully authenticate as a user whose password was disabled.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2021-3652 KY3.4-4A three-eight-nine-ds-base Unaffected
CVE-2021-3652 KY3.4-5A three-eight-nine-ds-base Unaffected
CVE-2021-3652 KY3.5.1 three-eight-nine-ds-base Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2022-1538 下一篇:KylinSec-SA-2022-1540