Date: Sat, 28 Mar 2015 23:52:12 +0100 From: Yves-Alexis Perez <corsac@...ian.org> To: oss-security@...ts.openwall.com Cc: team@...urity.debian.org Subject: CVE request (Debian specific): slapd: dangerous access rule in default config Hi, Debian bug #761406 was fixed in Debian sid some time ago, but no CVE was assigned. In order to raise some exposure, and make sure admins check/fix their config, we'll issue a DSA, so I'm requesting a CVE for this. The problem is that by default LDAP users have write access to their own attributes. If LDAP is used to grant permissions, and those permissions are stored as user attributes (for example by using the ou), then an user can modify its own permissions, which is usually not wanted. It's a Debian specific issue, but the OpenLDAP documentation  actually recommends something like that. Thanks in advance, : https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761406 : http://www.openldap.org/doc/admin24/guide.html#Basic ACLs -- Yves-Alexis Download attachment "signature.asc" of type "application/pgp-signature" (474 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.