CVE-2014-3562

CVSS V2 Medium 5 CVSS V3 None
Description
Red Hat Directory Server 8 and 389 Directory Server, when debugging is enabled, allows remote attackers to obtain sensitive replicated metadata by searching the directory.
Overview
  • CVE ID
  • CVE-2014-3562
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2014-08-21T14:55:04
  • Last Modified Date
  • 2023-02-13T00:40:41
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:fedoraproject:389_directory_server:1.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc3:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc4:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a2:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a3:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a4:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc3:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc6:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc7:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.6.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.7:alpha3:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.7.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha1:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha2:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha3:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.9.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:alpha8:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.19:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.20:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.21:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.22:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.23:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.25:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.26:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:redhat:directory_server:8.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:P/I:N/A:N
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • NONE
  • Availability Impact
  • NONE
  • Base Score
  • 5
  • Severity
  • MEDIUM
  • Exploitability Score
  • 10
  • Impact Score
  • 2.9
History
Created Old Value New Value Data Type Notes
2022-05-10 17:43:12 Added to TrackCVE
2022-12-02 00:19:29 2014-08-21T14:55Z 2014-08-21T14:55:04 CVE Published Date updated
2022-12-02 00:19:29 2019-04-22T17:48:00 CVE Modified Date updated
2022-12-02 00:19:29 Analyzed Vulnerability Status updated
2023-02-02 21:04:22 2023-02-02T20:17:26 CVE Modified Date updated
2023-02-02 21:04:22 Analyzed Modified Vulnerability Status updated
2023-02-02 21:04:22 Red Hat Directory Server 8 and 389 Directory Server, when debugging is enabled, allows remote attackers to obtain sensitive replicated metadata by searching the directory. It was found that when replication was enabled for each attribute in Red Hat Directory Server / 389 Directory Server, which is the default configuration, the server returned replicated metadata when the directory was searched while debugging was enabled. A remote attacker could use this flaw to disclose potentially sensitive information. Description updated
2023-02-02 21:04:29 References updated
2023-02-13 01:05:03 2023-02-13T00:40:41 CVE Modified Date updated
2023-02-13 01:05:04 It was found that when replication was enabled for each attribute in Red Hat Directory Server / 389 Directory Server, which is the default configuration, the server returned replicated metadata when the directory was searched while debugging was enabled. A remote attacker could use this flaw to disclose potentially sensitive information. Red Hat Directory Server 8 and 389 Directory Server, when debugging is enabled, allows remote attackers to obtain sensitive replicated metadata by searching the directory. Description updated