Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2019:1397-1

Опубликовано: 15 мая 2019
Источник: suse-cvrf

Описание

Security update for 389-ds

This update for 389-ds fixes the following issues:

The following security vulnerabilities were addressed:

  • CVE-2018-10850: Fixed a race condition on reference counter that would lead to a denial of service using persistent search (bsc#1096368)
  • CVE-2017-15134: Fixed a remote denial of service via search filters in slapi_filter_sprintf in slapd/util.c (bsc#1076530)
  • CVE-2017-15135: Fixed authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_malloc.c (bsc#1076530)
  • CVE-2018-10935: Fixed an issue that allowed users to cause a crash via ldapsearch with server side sorts (bsc#1105606)
  • CVE-2018-14624: The lock controlling the error log was not correctly used when re-opening the log file in log__error_emergency(), allowing an attacker to send a flood of modifications to a very large DN, which could have caused slapd to crash (bsc#1106699).

This update was imported from the SUSE:SLE-15:Update update project.

Список пакетов

openSUSE Leap 15.0
389-ds-1.4.0.3-lp150.3.3.1
389-ds-devel-1.4.0.3-lp150.3.3.1
389-ds-snmp-1.4.0.3-lp150.3.3.1

Описание

A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5 handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.


Затронутые продукты
openSUSE Leap 15.0:389-ds-1.4.0.3-lp150.3.3.1
openSUSE Leap 15.0:389-ds-devel-1.4.0.3-lp150.3.3.1
openSUSE Leap 15.0:389-ds-snmp-1.4.0.3-lp150.3.3.1

Ссылки

Описание

It was found that 389-ds-base since 1.3.6.1 up to and including 1.4.0.3 did not always handle internal hash comparison operations correctly during the authentication process. A remote, unauthenticated attacker could potentially use this flaw to bypass the authentication process under very rare and specific circumstances.


Затронутые продукты
openSUSE Leap 15.0:389-ds-1.4.0.3-lp150.3.3.1
openSUSE Leap 15.0:389-ds-devel-1.4.0.3-lp150.3.3.1
openSUSE Leap 15.0:389-ds-snmp-1.4.0.3-lp150.3.3.1

Ссылки

Описание

389-ds-base before versions 1.4.0.10, 1.3.8.3 is vulnerable to a race condition in the way 389-ds-base handles persistent search, resulting in a crash if the server is under load. An anonymous attacker could use this flaw to trigger a denial of service.


Затронутые продукты
openSUSE Leap 15.0:389-ds-1.4.0.3-lp150.3.3.1
openSUSE Leap 15.0:389-ds-devel-1.4.0.3-lp150.3.3.1
openSUSE Leap 15.0:389-ds-snmp-1.4.0.3-lp150.3.3.1

Ссылки

Описание

A flaw was found in the 389 Directory Server that allows users to cause a crash in the LDAP server using ldapsearch with server side sort.


Затронутые продукты
openSUSE Leap 15.0:389-ds-1.4.0.3-lp150.3.3.1
openSUSE Leap 15.0:389-ds-devel-1.4.0.3-lp150.3.3.1
openSUSE Leap 15.0:389-ds-snmp-1.4.0.3-lp150.3.3.1

Ссылки

Описание

A vulnerability was discovered in 389-ds-base through versions 1.3.7.10, 1.3.8.8 and 1.4.0.16. The lock controlling the error log was not correctly used when re-opening the log file in log__error_emergency(). An attacker could send a flood of modifications to a very large DN, which would cause slapd to crash.


Затронутые продукты
openSUSE Leap 15.0:389-ds-1.4.0.3-lp150.3.3.1
openSUSE Leap 15.0:389-ds-devel-1.4.0.3-lp150.3.3.1
openSUSE Leap 15.0:389-ds-snmp-1.4.0.3-lp150.3.3.1

Ссылки
Уязвимость openSUSE-SU-2019:1397-1