Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2019:1207-2

Опубликовано: 01 июл. 2019
Источник: suse-cvrf

Описание

Security update for 389-ds

This update for 389-ds fixes the following issues:

The following security vulnerabilities were addressed:

  • CVE-2018-10850: Fixed a race condition on reference counter that would lead to a denial of service using persistent search (bsc#1096368)
  • CVE-2017-15134: Fixed a remote denial of service via search filters in slapi_filter_sprintf in slapd/util.c (bsc#1076530)
  • CVE-2017-15135: Fixed authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_malloc.c (bsc#1076530)
  • CVE-2018-10935: Fixed an issue that allowed users to cause a crash via ldapsearch with server side sorts (bsc#1105606)
  • CVE-2018-14624: The lock controlling the error log was not correctly used when re-opening the log file in log__error_emergency(), allowing an attacker to send a flood of modifications to a very large DN, which could have caused slapd to crash (bsc#1106699).

Список пакетов

SUSE Linux Enterprise Module for Server Applications 15 SP1
389-ds-1.4.0.3-4.7.52
389-ds-devel-1.4.0.3-4.7.52

Описание

A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5 handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.


Затронутые продукты
SUSE Linux Enterprise Module for Server Applications 15 SP1:389-ds-1.4.0.3-4.7.52
SUSE Linux Enterprise Module for Server Applications 15 SP1:389-ds-devel-1.4.0.3-4.7.52

Ссылки

Описание

It was found that 389-ds-base since 1.3.6.1 up to and including 1.4.0.3 did not always handle internal hash comparison operations correctly during the authentication process. A remote, unauthenticated attacker could potentially use this flaw to bypass the authentication process under very rare and specific circumstances.


Затронутые продукты
SUSE Linux Enterprise Module for Server Applications 15 SP1:389-ds-1.4.0.3-4.7.52
SUSE Linux Enterprise Module for Server Applications 15 SP1:389-ds-devel-1.4.0.3-4.7.52

Ссылки

Описание

389-ds-base before versions 1.4.0.10, 1.3.8.3 is vulnerable to a race condition in the way 389-ds-base handles persistent search, resulting in a crash if the server is under load. An anonymous attacker could use this flaw to trigger a denial of service.


Затронутые продукты
SUSE Linux Enterprise Module for Server Applications 15 SP1:389-ds-1.4.0.3-4.7.52
SUSE Linux Enterprise Module for Server Applications 15 SP1:389-ds-devel-1.4.0.3-4.7.52

Ссылки

Описание

A flaw was found in the 389 Directory Server that allows users to cause a crash in the LDAP server using ldapsearch with server side sort.


Затронутые продукты
SUSE Linux Enterprise Module for Server Applications 15 SP1:389-ds-1.4.0.3-4.7.52
SUSE Linux Enterprise Module for Server Applications 15 SP1:389-ds-devel-1.4.0.3-4.7.52

Ссылки

Описание

A vulnerability was discovered in 389-ds-base through versions 1.3.7.10, 1.3.8.8 and 1.4.0.16. The lock controlling the error log was not correctly used when re-opening the log file in log__error_emergency(). An attacker could send a flood of modifications to a very large DN, which would cause slapd to crash.


Затронутые продукты
SUSE Linux Enterprise Module for Server Applications 15 SP1:389-ds-1.4.0.3-4.7.52
SUSE Linux Enterprise Module for Server Applications 15 SP1:389-ds-devel-1.4.0.3-4.7.52

Ссылки
Уязвимость SUSE-SU-2019:1207-2