{"id":"MGASA-2016-0350","summary":"Updated 389-ds-base packages fix security vulnerability","details":"A vulnerability in 389-ds-base was found that allows to bypass limitations\nfor compare and read operations specified by Access Control Instructions.\nWhen having LDAP sub-tree with some existing objects and having BIND DN\nwhich have no privileges over objects inside the sub-tree, unprivileged\nuser can send LDAP ADD operation specifying an object in (supposedly)\ninaccessible sub-tree. The returned error messages discloses the\ninformation when the queried object exists having the specified value.\nAttacker can use this flaw to guess values of RDN component by repeating\nthe above process (CVE-2016-4992).\n","modified":"2026-04-16T06:24:48.630824146Z","published":"2016-10-21T14:48:32Z","upstream":["CVE-2016-4992"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0350.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=19304"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/D2LEPJLCLU4I6ROZM3NHIDSPKCZUF3DR/"}],"affected":[{"package":{"name":"389-ds-base","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/389-ds-base?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.3.4.14-1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0350.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}