CVE-2011-1024

Source
https://nvd.nist.gov/vuln/detail/CVE-2011-1024
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2011-1024.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2011-1024
Related
Published
2011-03-20T02:00:03Z
Modified
2024-06-30T12:01:22Z
Summary
[none]
Details

chain.c in back-ldap in OpenLDAP 2.4.x before 2.4.24, when a master-slave configuration with a chain overlay and ppolicyforwardupdates (aka authentication-failure forwarding) is used, allows remote authenticated users to bypass external-program authentication by sending an invalid password to a slave server.

References

Affected packages

Debian:11 / openldap

Package

Name
openldap
Purl
pkg:deb/debian/openldap?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.25-1

Ecosystem specific

{
    "urgency": "low"
}

Debian:12 / openldap

Package

Name
openldap
Purl
pkg:deb/debian/openldap?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.25-1

Ecosystem specific

{
    "urgency": "low"
}

Debian:13 / openldap

Package

Name
openldap
Purl
pkg:deb/debian/openldap?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.25-1

Ecosystem specific

{
    "urgency": "low"
}