CVE-2014-0132

Source
https://cve.org/CVERecord?id=CVE-2014-0132
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2014-0132.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2014-0132
Downstream
Published
2014-03-18T17:02:53Z
Modified
2026-04-16T06:23:27.046875600Z
Summary
[none]
Details

The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.

References

Affected packages