CVE-2017-8028

NameCVE-2017-8028
DescriptionIn Pivotal Spring-LDAP versions 1.3.0 - 2.3.1, when connected to some LDAP servers, when no additional attributes are bound, and when using LDAP BindAuthenticator with org.springframework.ldap.core.support.DefaultTlsDirContextAuthenticationStrategy as the authentication strategy, and setting userSearch, authentication is allowed with an arbitrary password when the username is correct. This occurs because some LDAP vendors require an explicit operation for the LDAP bind to take effect.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1180-1, DSA-4046-1
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libspring-ldap-java (PTS)jessie (security), jessie1.3.1.RELEASE-5+deb8u1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libspring-ldap-javasource(unstable)(unfixed)medium
libspring-ldap-javasourcejessie1.3.1.RELEASE-5+deb8u1mediumDSA-4046-1
libspring-ldap-javasourcewheezy1.3.1.RELEASE-4+deb7u1mediumDLA-1180-1

Notes

https://pivotal.io/security/cve-2017-8028
https://github.com/spring-projects/spring-ldap/issues/430

Search for package or bug name: Reporting problems