MEDIUM · 4.2

CVE-2020-15719

libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectA...

Vulnerability Description

libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.

CVSS Score

4.2

MEDIUM

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
LOW
Integrity
LOW
Availability
NONE

Affected Products

VendorProductVersions
OpenldapOpenldap< 2.4.46-10.el8
RedhatEnterprise Linux8.0
OpensuseLeap15.1
McafeePolicy Auditor< 6.5.1
OracleBlockchain Platform< 21.1.2

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-15719?

CVE-2020-15719 is a vulnerability with a CVSS score of 4.2 (MEDIUM). libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectA...

How severe is CVE-2020-15719?

CVE-2020-15719 has been rated MEDIUM with a CVSS base score of 4.2/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2020-15719?

Check the references section above for vendor advisories and patch information. Affected products include: Openldap Openldap, Redhat Enterprise Linux, Opensuse Leap, Mcafee Policy Auditor, Oracle Blockchain Platform.