An issue was discovered in the server in OpenLDAP before 2.4.48. When the server administrator delegates rootDN (database admin) privileges for certain databases but wants to maintain isolation (e.g., for multi-tenant deployments), slapd does not properly stop a rootDN from requesting authorization as an identity from another database during a SASL bind or with a proxyAuthz (RFC 4370) control. (It is not a common configuration to deploy a system where the server administrator and a DB administrator enjoy different levels of trust.)
{
"unresolved_ranges": [
{
"source": "CPE_FIELD",
"extracted_events": [
{
"fixed": "6.5.1"
}
],
"cpe": "cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "6.5.1"
}
],
"cpe": "cpe:2.3:a:mcafee:policy_auditor:6.5.1:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"fixed": "21.1.2"
}
],
"cpe": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.8"
}
],
"cpe": "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "10.13"
},
{
"fixed": "10.13.6"
},
{
"introduced": "10.14"
},
{
"fixed": "10.14.6"
},
{
"introduced": "10.15"
},
{
"fixed": "10.15.2"
}
],
"cpe": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.13.6-NA"
}
],
"cpe": "cpe:2.3:o:apple:mac_os_x:10.13.6:-:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.13.6-security_update_2018\\-002"
}
],
"cpe": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-002:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.13.6-security_update_2018\\-003"
}
],
"cpe": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-003:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.13.6-security_update_2019\\-001"
}
],
"cpe": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-001:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.13.6-security_update_2019\\-002"
}
],
"cpe": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-002:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.13.6-security_update_2019\\-003"
}
],
"cpe": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-003:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.13.6-security_update_2019\\-004"
}
],
"cpe": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-004:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.13.6-security_update_2019\\-005"
}
],
"cpe": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-005:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.13.6-security_update_2019\\-006"
}
],
"cpe": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-006:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.14.6"
}
],
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.14.6-NA"
}
],
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.14.6-security_update_2019\\-001"
}
],
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "12.04"
}
],
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "14.04"
}
],
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "16.04"
}
],
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "18.04"
}
],
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "19.04"
}
],
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.0"
}
],
"cpe": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "15.0"
}
],
"cpe": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "15.1"
}
],
"cpe": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "11"
}
],
"cpe": "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*"
}
]
}{
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "2.4.48"
}
],
"cpe": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*"
}[
{
"signature_type": "Function",
"source": "https://github.com/openldap/openldap/commit/1f25fbc9b92823540db460b7618988d3feafbc50",
"signature_version": "v1",
"id": "CVE-2019-13057-8d670119",
"deprecated": false,
"target": {
"file": "libraries/libldap/cyrus.c",
"function": "ldap_int_sasl_bind"
},
"digest": {
"length": 6455.0,
"function_hash": "81063690992040781467550700777675779130"
}
},
{
"signature_type": "Line",
"source": "https://github.com/openldap/openldap/commit/1f25fbc9b92823540db460b7618988d3feafbc50",
"signature_version": "v1",
"id": "CVE-2019-13057-93261e78",
"deprecated": false,
"target": {
"file": "libraries/libldap/cyrus.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"312627585656422542698671092433723073376",
"338667210732090488210469566781984538516",
"174272373029822939739738495638263106988",
"73299445739927031031918352608744476866",
"79328900896938706329537600223240551847",
"19630966697333832462434547331236633149",
"215322681832582147462375593403124087236",
"237705069010983046172293202720829508463",
"138915725995887299269478284513847673777",
"102423115331596487121742125187167279873",
"16320344604405346819738529550927297199",
"202584951158536821866804847025545586148"
]
}
}
]
"2026-04-11T21:44:50Z"
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-13057.json"