389-ds-base-1.2.11.15-94.AXS4
エラータID: AXSA:2018-2619:01
389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.
Security Fix(es):
* 389-ds-base: remote Denial of Service (DoS) via search filters in SetUnicodeStringFromUTF_8 in collate.c (CVE-2018-1054)
* 389-ds-base: Authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_malloc.c (CVE-2017-15135)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
The CVE-2017-15135 issue was discovered by Martin Poole (Asianux).
CVE-2017-15135
It was found that 389-ds-base since 1.3.6.1 up to and including
1.4.0.3 did not always handle internal hash comparison operations
correctly during the authentication process. A remote, unauthenticated
attacker could potentially use this flaw to bypass the authentication
process under very rare and specific circumstances.
CVE-2018-1054
An out-of-bounds memory read flaw was found in the way 389-ds-base
handled certain LDAP search filters, affecting all versions including
1.4.x. A remote, unauthenticated attacker could potentially use this
flaw to make ns-slapd crash via a specially crafted LDAP request, thus
resulting in denial of service.
Update packages.
It was found that 389-ds-base since 1.3.6.1 up to and including 1.4.0.3 did not always handle internal hash comparison operations correctly during the authentication process. A remote, unauthenticated attacker could potentially use this flaw to bypass the authentication process under very rare and specific circumstances.
An out-of-bounds memory read flaw was found in the way 389-ds-base handled certain LDAP search filters, affecting all versions including 1.4.x. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
N/A
SRPMS
- 389-ds-base-1.2.11.15-94.AXS4.src.rpm
MD5: fe9a20093c3bb4c0843ab62ece69741e
SHA-256: 11980919fa06e358e4c6536f554f283c5604fb3bb728ba78eeb982c3fd93309e
Size: 4.23 MB
Asianux Server 4 for x86
- 389-ds-base-1.2.11.15-94.AXS4.i686.rpm
MD5: abcfafbff10a67ed4e95c555ca0dce11
SHA-256: e24afc22567edabe2ab6222e6dd6060cf13b870c3ab094689524319104c924dc
Size: 1.52 MB - 389-ds-base-libs-1.2.11.15-94.AXS4.i686.rpm
MD5: 596ca68ea1c2558ffce1672238ec0a8e
SHA-256: e004399c11562a0e4a03914511adc1fb3d84c95a6f64032d977e6acd090eac74
Size: 449.84 kB
Asianux Server 4 for x86_64
- 389-ds-base-1.2.11.15-94.AXS4.x86_64.rpm
MD5: 12e487cffa6176c8bdc39d614dcf1fc1
SHA-256: 25a3796ca6fc03546e0bf591a51a5a13c6b35efc9093f54579e6449a76ff6c69
Size: 1.52 MB - 389-ds-base-libs-1.2.11.15-94.AXS4.x86_64.rpm
MD5: 94f231ead47ebb2d23b992107aa7bbc8
SHA-256: 01a7c82de65ff780ba30e70199c9f1ffe4199306bfc015ce50031a3e5aca469e
Size: 444.50 kB - 389-ds-base-libs-1.2.11.15-94.AXS4.i686.rpm
MD5: 596ca68ea1c2558ffce1672238ec0a8e
SHA-256: e004399c11562a0e4a03914511adc1fb3d84c95a6f64032d977e6acd090eac74
Size: 449.84 kB