An issue was discovered in the server in OpenLDAP before 2.4.48. When the server administrator delegates rootDN (database admin) privileges for certain databases but wants to maintain isolation (e.g., for multi-tenant deployments), slapd does not properly stop a rootDN from requesting authorization as an identity from another database during a SASL bind or with a proxyAuthz (RFC 4370) control. (It is not a common configuration to deploy a system where the server administrator and a DB administrator enjoy different levels of trust.)
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1891-1 openldap security update
EUVD EUVD EUVD-2019-4617 An issue was discovered in the server in OpenLDAP before 2.4.48. When the server administrator delegates rootDN (database admin) privileges for certain databases but wants to maintain isolation (e.g., for multi-tenant deployments), slapd does not properly stop a rootDN from requesting authorization as an identity from another database during a SASL bind or with a proxyAuthz (RFC 4370) control. (It is not a common configuration to deploy a system where the server administrator and a DB administrator enjoy different levels of trust.)
Ubuntu USN Ubuntu USN USN-4078-1 OpenLDAP vulnerabilities
Ubuntu USN Ubuntu USN USN-4078-2 OpenLDAP vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T23:41:10.083Z

Reserved: 2019-06-29T00:00:00

Link: CVE-2019-13057

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-07-26T13:15:12.317

Modified: 2024-11-21T04:24:07.423

Link: CVE-2019-13057

cve-icon Redhat

Severity : Moderate

Publid Date: 2019-07-25T00:00:00Z

Links: CVE-2019-13057 - Bugzilla

cve-icon OpenCVE Enrichment

No data.