This question is in reference to Atlassian Documentation: Crowd Security Advisory 2016-10-19
According to my understanding, your installation has then a quite low risk of a security breach. Only a admin are able to breach your installation by setting up some type of "invalid" LDAP that use the exploit.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.