389-ds-base-1.3.6.1-28.el7

エラータID: AXSA:2018-2594:02

Release date: 
Thursday, March 8, 2018 - 10:37
Subject: 
389-ds-base-1.3.6.1-28.el7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
High
Description: 

389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.

Security Fix(es):

* 389-ds-base: remote Denial of Service (DoS) via search filters in SetUnicodeStringFromUTF_8 in collate.c (CVE-2018-1054)

* 389-ds-base: Authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_malloc.c (CVE-2017-15135)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

The CVE-2017-15135 issue was discovered by Martin Poole (Asianux).

Bug Fix(es):

* Previously, if an administrator configured an index for an attribute with a specific matching rule in the "nsMatchingRule" parameter, Directory Server did not use the retrieved indexer. As a consequence, Directory Server did not index the values of this attribute with the specified matching rules, and searches with extended filters were unindexed. With this update, Directory Server uses the retrieved indexer that processes the specified matching rule. As a result, searches using extended filters with a specified matching rule are now indexed. (BZ#1536343)

CVE-2017-15135
It was found that 389-ds-base since 1.3.6.1 up to and including
1.4.0.3 did not always handle internal hash comparison operations
correctly during the authentication process. A remote, unauthenticated
attacker could potentially use this flaw to bypass the authentication
process under very rare and specific circumstances.
CVE-2018-1054
An out-of-bounds memory read flaw was found in the way 389-ds-base
handled certain LDAP search filters, affecting all versions including
1.4.x. A remote, unauthenticated attacker could potentially use this
flaw to make ns-slapd crash via a specially crafted LDAP request, thus
resulting in denial of service.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. 389-ds-base-1.3.6.1-28.el7.src.rpm
    MD5: 610c411bb1e3920c2b1210909d800f34
    SHA-256: 73a1195913bdc9d59c96f5c90ec5fc232ff96661a48707778bed068e3f090b72
    Size: 3.64 MB

Asianux Server 7 for x86_64
  1. 389-ds-base-1.3.6.1-28.el7.x86_64.rpm
    MD5: af8e01cff39959b7b9ae237999543d8f
    SHA-256: 4f516224daab58537883d9533e6fd0a1aebf7d43c9b404593b31f81e19982384
    Size: 1.70 MB
  2. 389-ds-base-libs-1.3.6.1-28.el7.x86_64.rpm
    MD5: d6476b82a72c041c49f30a68be3305cb
    SHA-256: f7c21bc24faea573b67f4a5d59a5248cca20462601310b8917ac4b32fa8d1870
    Size: 680.77 kB