Vulnerability Description
Open Directory in Apple Mac OS X 10.7 before 10.7.2, when an LDAPv3 server is used with RFC 2307 or custom mappings, allows remote attackers to bypass the password requirement by leveraging lack of an AuthenticationAuthority attribute for a user account.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Mac Os X | 10.7.0 |
| Apple | Mac Os X Server | 10.7.0 |
Related Weaknesses (CWE)
References
- http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.htmlVendor Advisory
- http://osvdb.org/76371
- http://support.apple.com/kb/HT5002Vendor Advisory
- http://www.securityfocus.com/bid/50085
- http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.htmlVendor Advisory
- http://osvdb.org/76371
- http://support.apple.com/kb/HT5002Vendor Advisory
- http://www.securityfocus.com/bid/50085
FAQ
What is CVE-2011-3226?
CVE-2011-3226 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Open Directory in Apple Mac OS X 10.7 before 10.7.2, when an LDAPv3 server is used with RFC 2307 or custom mappings, allows remote attackers to bypass the password requirement by leveraging lack of an...
How severe is CVE-2011-3226?
CVE-2011-3226 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-3226?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Mac Os X, Apple Mac Os X Server.