CVE-2021-3652 log

Source
Severity Medium
Remote Yes
Type Authentication bypass
Description
In 389-ds-base before version 2.0.7, it was found that if an asterisk is imported as a password hash, either accidentally or maliciously, then instead of being inactive, any password will successfully match during authentication. This would allow an attacker to successfully authenticate as a user who's password was supposedly disabled.
Group Package Affected Fixed Severity Status Ticket
AVG-2206 389-ds-base 2.0.3-2 2.0.7-1 Medium Fixed
Date Advisory Group Package Severity Type
27 Jul 2021 ASA-202107-72 AVG-2206 389-ds-base Medium multiple issues
References
https://bugzilla.redhat.com/show_bug.cgi?id=1982782
https://github.com/389ds/389-ds-base/issues/4817
https://github.com/389ds/389-ds-base/pull/4819
https://github.com/389ds/389-ds-base/commit/aeb90eb0c41fc48541d983f323c627b2e6c328c7