You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@directory.apache.org by "Emmanuel Lecharny (JIRA)" <ji...@apache.org> on 2015/06/30 18:44:05 UTC

[jira] [Commented] (DIRSERVER-2078) High Security Vulnerabilities Found when using LDAPs

    [ https://issues.apache.org/jira/browse/DIRSERVER-2078?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14608632#comment-14608632 ] 

Emmanuel Lecharny commented on DIRSERVER-2078:
----------------------------------------------

Hi Tyler,

I would strongly suggest you report any security vulnerablilty you know of following the procedure described in http://www.apache.org/security/

Please attach any link that could help us to know about those vilnerability.

Many thanks !

> High Security Vulnerabilities Found when using LDAPs
> ----------------------------------------------------
>
>                 Key: DIRSERVER-2078
>                 URL: https://issues.apache.org/jira/browse/DIRSERVER-2078
>             Project: Directory ApacheDS
>          Issue Type: Bug
>          Components: ldap
>    Affects Versions: 2.0.0-M20
>         Environment: Server 2008 R2, Java 8
>            Reporter: Tyler Neemann
>              Labels: security
>
> Recent internal Qualys vulnerability scans are reporting High Security vulnerabilities when using LDAPs. I have searched through the documentation and cannot find any remediation to these issues. 
> Currently have LDAPs enabled, TLS enabled and Server Side password hashing enabled. Allow anonymous access is disabled
> Issues found
> 1. SSL/TLS Server Factoring RSA Export Keys (FREAK) vulnerability
> 2. SSL Server Allows Anonymous Authentication Vulnerability
> 3. SSL Server Allows Cleartext Communication Vulnerability
> Any help would be appreciated. 



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)