CVE-2017-14623

NameCVE-2017-14623
DescriptionIn the ldap.v2 (aka go-ldap) package through 2.5.0 for Go, an attacker may be able to login with an empty password. This issue affects an application using this package if these conditions are met: (1) it relies only on the return error of the Bind function call to determine whether a user is authorized (i.e., a nil return value is interpreted as successful authorization) and (2) it is used with an LDAP server allowing unauthenticated bind.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs876404

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
golang-github-go-ldap-ldap (PTS)buster2.5.1-4fixed
bullseye3.2.3-1fixed
bookworm3.4.4-2fixed
sid, trixie3.4.6-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
golang-github-go-ldap-ldapsourcestretch2.4.1-1+deb9u1
golang-github-go-ldap-ldapsource(unstable)2.5.1-1low876404

Notes

https://github.com/go-ldap/ldap/pull/126
https://github.com/go-ldap/ldap/commit/95ede1266b237bf8e9aa5dce0b3250e51bfefe66

Search for package or bug name: Reporting problems