Access Restriction Bypass Affecting 389ds/389-ds-base package, versions [1.2.1,1.2.8]


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-389DS389DSBASE-3003900
  • published26 Jan 2022
  • disclosed23 Feb 2011
  • creditUnknown

Introduced: 23 Feb 2011

CVE-2011-0532  (opens in a new tab)
CWE-264  (opens in a new tab)

How to fix?

There is no fixed version for 389ds/389-ds-base.

Overview

Affected versions of this package are vulnerable to Access Restriction Bypass. The (1) backup and restore scripts, (2) main initialization script, and (3) ldap-agent script in 389 Directory Server 1.2.x (aka Red Hat Directory Server 8.2.x) place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.

CVSS Scores

version 3.1