A flaw was found in 389-ds-base. If an asterisk is imported as password hashes, either accidentally or maliciously, then instead of being inactive, any password will successfully match during authentication. This flaw allows an attacker to successfully authenticate as a user whose password was disabled.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3399-1 | 389-ds-base security update |
Debian DLA |
DLA-4021-1 | 389-ds-base security update |
EUVD |
EUVD-2021-26948 | A flaw was found in 389-ds-base. If an asterisk is imported as password hashes, either accidentally or maliciously, then instead of being inactive, any password will successfully match during authentication. This flaw allows an attacker to successfully authenticate as a user whose password was disabled. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 03 Nov 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-03T20:33:48.435Z
Reserved: 2021-07-16T00:00:00.000Z
Link: CVE-2021-3652
No data.
Status : Modified
Published: 2022-04-18T17:15:15.443
Modified: 2025-11-03T21:15:42.273
Link: CVE-2021-3652
OpenCVE Enrichment
No data.
Debian DLA
EUVD