Описание
Security update for 389-ds
This update for 389-ds fixes the following issues:
The following security vulnerabilities were addressed:
- CVE-2018-10850: Fixed a race condition on reference counter that would lead to a denial of service using persistent search (bsc#1096368)
- CVE-2017-15134: Fixed a remote denial of service via search filters in slapi_filter_sprintf in slapd/util.c (bsc#1076530)
- CVE-2017-15135: Fixed authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_malloc.c (bsc#1076530)
- CVE-2018-10935: Fixed an issue that allowed users to cause a crash via ldapsearch with server side sorts (bsc#1105606)
- CVE-2018-14624: The lock controlling the error log was not correctly used when re-opening the log file in log__error_emergency(), allowing an attacker to send a flood of modifications to a very large DN, which could have caused slapd to crash (bsc#1106699).
Список пакетов
SUSE Linux Enterprise Module for Server Applications 15
Ссылки
- Link for SUSE-SU-2019:1207-1
- E-Mail link for SUSE-SU-2019:1207-1
- SUSE Security Ratings
- SUSE Bug 1076530
- SUSE Bug 1096368
- SUSE Bug 1105606
- SUSE Bug 1106699
- SUSE CVE CVE-2017-15134 page
- SUSE CVE CVE-2017-15135 page
- SUSE CVE CVE-2018-10850 page
- SUSE CVE CVE-2018-10935 page
- SUSE CVE CVE-2018-14624 page
Описание
A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5 handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
Затронутые продукты
Ссылки
- CVE-2017-15134
- SUSE Bug 1007004
- SUSE Bug 1076530
Описание
It was found that 389-ds-base since 1.3.6.1 up to and including 1.4.0.3 did not always handle internal hash comparison operations correctly during the authentication process. A remote, unauthenticated attacker could potentially use this flaw to bypass the authentication process under very rare and specific circumstances.
Затронутые продукты
Ссылки
- CVE-2017-15135
- SUSE Bug 1007004
- SUSE Bug 1076530
Описание
389-ds-base before versions 1.4.0.10, 1.3.8.3 is vulnerable to a race condition in the way 389-ds-base handles persistent search, resulting in a crash if the server is under load. An anonymous attacker could use this flaw to trigger a denial of service.
Затронутые продукты
Ссылки
- CVE-2018-10850
- SUSE Bug 1096368
Описание
A flaw was found in the 389 Directory Server that allows users to cause a crash in the LDAP server using ldapsearch with server side sort.
Затронутые продукты
Ссылки
- CVE-2018-10935
- SUSE Bug 1105606
Описание
A vulnerability was discovered in 389-ds-base through versions 1.3.7.10, 1.3.8.8 and 1.4.0.16. The lock controlling the error log was not correctly used when re-opening the log file in log__error_emergency(). An attacker could send a flood of modifications to a very large DN, which would cause slapd to crash.
Затронутые продукты
Ссылки
- CVE-2018-14624
- SUSE Bug 1106699