CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
EPSS
Percentile
48.7%
Issue Overview:
A flaw was found in 389-ds-base. If an asterisk is imported as password hashes, either accidentally or maliciously, then instead of being inactive, any password will successf
ully match during authentication. This flaw allows an attacker to successfully authenticate as a user whose password was disabled. (CVE-2021-3652)
Affected Packages:
389-ds-base
Issue Correction:
Run yum update 389-ds-base to update your system.
New Packages:
i686:
389-ds-base-debuginfo-1.3.10.2-9.67.amzn1.i686
389-ds-base-1.3.10.2-9.67.amzn1.i686
389-ds-base-devel-1.3.10.2-9.67.amzn1.i686
389-ds-base-libs-1.3.10.2-9.67.amzn1.i686
389-ds-base-snmp-1.3.10.2-9.67.amzn1.i686
src:
389-ds-base-1.3.10.2-9.67.amzn1.src
x86_64:
389-ds-base-libs-1.3.10.2-9.67.amzn1.x86_64
389-ds-base-1.3.10.2-9.67.amzn1.x86_64
389-ds-base-devel-1.3.10.2-9.67.amzn1.x86_64
389-ds-base-debuginfo-1.3.10.2-9.67.amzn1.x86_64
389-ds-base-snmp-1.3.10.2-9.67.amzn1.x86_64
Red Hat: CVE-2021-3652
Mitre: CVE-2021-3652
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
EPSS
Percentile
48.7%