FKIE_CVE-2006-4600

Vulnerability from fkie_nvd - Published: 2006-09-07 00:04 - Updated: 2025-04-03 01:03
Severity ?
Summary
slapd in OpenLDAP before 2.3.25 allows remote authenticated users with selfwrite Access Control List (ACL) privileges to modify arbitrary Distinguished Names (DN).
References
cve@mitre.orgftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
cve@mitre.orghttp://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
cve@mitre.orghttp://secunia.com/advisories/21721Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/22219
cve@mitre.orghttp://secunia.com/advisories/22273
cve@mitre.orghttp://secunia.com/advisories/22300
cve@mitre.orghttp://secunia.com/advisories/25098
cve@mitre.orghttp://secunia.com/advisories/25628
cve@mitre.orghttp://secunia.com/advisories/25676
cve@mitre.orghttp://secunia.com/advisories/25894
cve@mitre.orghttp://secunia.com/advisories/26909
cve@mitre.orghttp://secunia.com/advisories/27706
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200711-23.xml
cve@mitre.orghttp://securitytracker.com/id?1016783
cve@mitre.orghttp://support.avaya.com/elmodocs2/security/ASA-2007-232.htm
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:171
cve@mitre.orghttp://www.openldap.org/its/index.cgi/Software%20Bugs?id=4587Patch
cve@mitre.orghttp://www.openldap.org/lists/openldap-announce/200608/msg00000.htmlPatch
cve@mitre.orghttp://www.openldap.org/software/release/changes.htmlPatch
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-0310.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-0430.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/447395/100/200/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/19832Patch
cve@mitre.orghttp://www.trustix.org/errata/2006/0055
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/2186
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/3229
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/28772
cve@mitre.orghttps://issues.rpath.com/browse/RPL-667
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9618
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
af854a3a-2127-422b-91ae-364da2661108http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21721Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22219
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22273
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22300
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25098
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25628
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25676
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25894
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26909
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27706
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200711-23.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016783
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2007-232.htm
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:171
af854a3a-2127-422b-91ae-364da2661108http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4587Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openldap.org/lists/openldap-announce/200608/msg00000.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://www.openldap.org/software/release/changes.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0310.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0430.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447395/100/200/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/19832Patch
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2006/0055
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2186
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/3229
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/28772
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-667
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9618
Impacted products
Vendor Product Version
openldap openldap 2.0.20
openldap openldap 2.0.21
openldap openldap 2.0.22
openldap openldap 2.0.23
openldap openldap 2.0.24

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openldap:openldap:2.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E643F8-005A-4170-8275-8E4AB5C25209",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openldap:openldap:2.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8A34C63-C17D-4026-B409-AA9A56529B87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openldap:openldap:2.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EA863B0-A6AB-44BD-84E8-B6C885EFFE10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openldap:openldap:2.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "24BFAEC7-6256-4B8F-83F5-60FBD1571936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openldap:openldap:2.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "83227371-ACC3-4217-BFF9-0A3AAADD50DD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "slapd in OpenLDAP before 2.3.25 allows remote authenticated users with selfwrite Access Control List (ACL) privileges to modify arbitrary Distinguished Names (DN)."
    },
    {
      "lang": "es",
      "value": "slapd en OpenLDAP anterior a 2.3.25 permite a un atacante remoto validar a usuarios con privilegios del Access Control List del selfwrite (ACL) para modificar los Distinguished Names (DN) de su elecci\u00f3n."
    }
  ],
  "id": "CVE-2006-4600",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 2.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 4.4,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-09-07T00:04:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21721"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/22219"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/22273"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/22300"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25098"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25628"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25676"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25894"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26909"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/27706"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200711-23.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016783"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-232.htm"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:171"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4587"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openldap.org/lists/openldap-announce/200608/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openldap.org/software/release/changes.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0310.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0430.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/447395/100/200/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/19832"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.trustix.org/errata/2006/0055"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/2186"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/3229"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28772"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.rpath.com/browse/RPL-667"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9618"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21721"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22219"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22273"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22300"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25098"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25628"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25676"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25894"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26909"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27706"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200711-23.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016783"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-232.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:171"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4587"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openldap.org/lists/openldap-announce/200608/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openldap.org/software/release/changes.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0310.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0430.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/447395/100/200/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/19832"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2006/0055"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2186"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/3229"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28772"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-667"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9618"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=205826\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.  More information regarding issue severity can be found here:\nhttp://www.redhat.com/security/updates/classification/\n\nThe risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 2.1 which is in maintenance mode.",
      "lastModified": "2007-09-05T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…