fkie_cve-2006-4600
Vulnerability from fkie_nvd
Published
2006-09-07 00:04
Modified
2025-04-03 01:03
Severity ?
Summary
slapd in OpenLDAP before 2.3.25 allows remote authenticated users with selfwrite Access Control List (ACL) privileges to modify arbitrary Distinguished Names (DN).
References
cve@mitre.orgftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
cve@mitre.orghttp://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
cve@mitre.orghttp://secunia.com/advisories/21721Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/22219
cve@mitre.orghttp://secunia.com/advisories/22273
cve@mitre.orghttp://secunia.com/advisories/22300
cve@mitre.orghttp://secunia.com/advisories/25098
cve@mitre.orghttp://secunia.com/advisories/25628
cve@mitre.orghttp://secunia.com/advisories/25676
cve@mitre.orghttp://secunia.com/advisories/25894
cve@mitre.orghttp://secunia.com/advisories/26909
cve@mitre.orghttp://secunia.com/advisories/27706
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200711-23.xml
cve@mitre.orghttp://securitytracker.com/id?1016783
cve@mitre.orghttp://support.avaya.com/elmodocs2/security/ASA-2007-232.htm
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:171
cve@mitre.orghttp://www.openldap.org/its/index.cgi/Software%20Bugs?id=4587Patch
cve@mitre.orghttp://www.openldap.org/lists/openldap-announce/200608/msg00000.htmlPatch
cve@mitre.orghttp://www.openldap.org/software/release/changes.htmlPatch
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-0310.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-0430.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/447395/100/200/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/19832Patch
cve@mitre.orghttp://www.trustix.org/errata/2006/0055
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/2186
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/3229
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/28772
cve@mitre.orghttps://issues.rpath.com/browse/RPL-667
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9618
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
af854a3a-2127-422b-91ae-364da2661108http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21721Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22219
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22273
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22300
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25098
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25628
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25676
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25894
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26909
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27706
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200711-23.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016783
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2007-232.htm
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:171
af854a3a-2127-422b-91ae-364da2661108http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4587Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openldap.org/lists/openldap-announce/200608/msg00000.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://www.openldap.org/software/release/changes.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0310.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0430.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447395/100/200/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/19832Patch
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2006/0055
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2186
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/3229
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/28772
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-667
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9618
Impacted products
Vendor Product Version
openldap openldap 2.0.20
openldap openldap 2.0.21
openldap openldap 2.0.22
openldap openldap 2.0.23
openldap openldap 2.0.24



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openldap:openldap:2.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E643F8-005A-4170-8275-8E4AB5C25209",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openldap:openldap:2.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8A34C63-C17D-4026-B409-AA9A56529B87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openldap:openldap:2.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EA863B0-A6AB-44BD-84E8-B6C885EFFE10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openldap:openldap:2.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "24BFAEC7-6256-4B8F-83F5-60FBD1571936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openldap:openldap:2.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "83227371-ACC3-4217-BFF9-0A3AAADD50DD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "slapd in OpenLDAP before 2.3.25 allows remote authenticated users with selfwrite Access Control List (ACL) privileges to modify arbitrary Distinguished Names (DN)."
    },
    {
      "lang": "es",
      "value": "slapd en OpenLDAP anterior a 2.3.25 permite a un atacante remoto validar a usuarios con privilegios del Access Control List del selfwrite (ACL) para modificar los Distinguished Names (DN) de su elecci\u00f3n."
    }
  ],
  "id": "CVE-2006-4600",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 2.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 4.4,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-09-07T00:04:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21721"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/22219"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/22273"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/22300"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25098"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25628"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25676"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25894"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26909"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/27706"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200711-23.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016783"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-232.htm"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:171"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4587"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openldap.org/lists/openldap-announce/200608/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openldap.org/software/release/changes.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0310.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0430.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/447395/100/200/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/19832"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.trustix.org/errata/2006/0055"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/2186"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/3229"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28772"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.rpath.com/browse/RPL-667"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9618"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21721"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22219"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22273"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22300"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25098"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25628"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25676"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25894"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26909"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27706"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200711-23.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016783"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-232.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:171"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4587"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openldap.org/lists/openldap-announce/200608/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openldap.org/software/release/changes.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0310.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0430.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/447395/100/200/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/19832"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2006/0055"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2186"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/3229"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28772"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-667"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9618"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=205826\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.  More information regarding issue severity can be found here:\nhttp://www.redhat.com/security/updates/classification/\n\nThe risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 2.1 which is in maintenance mode.",
      "lastModified": "2007-09-05T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…