![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.10.2019.0411 |
Category: | Mageia Linux Local Security Checks |
Title: | Mageia: Security Advisory (MGASA-2019-0411) |
Summary: | The remote host is missing an update for the '389-ds-base' package(s) announced via the MGASA-2019-0411 advisory. |
Description: | Summary: The remote host is missing an update for the '389-ds-base' package(s) announced via the MGASA-2019-0411 advisory. Vulnerability Insight: he updated packages fix security vulnerabilities and a packaging problem: An out-of-bounds memory read flaw was found in the way 389-ds-base handled certain LDAP search filters, affecting all versions including 1.4.x. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service. (CVE-2018-1054) 389-ds-base before versions 1.3.8.5, 1.4.0.12 is vulnerable to a Cleartext Storage of Sensitive Information. By default, when the Replica and/or retroChangeLog plugins are enabled, 389-ds-base stores passwords in plaintext format in their respective changelog files. An attacker with sufficiently high privileges, such as root or Directory Manager, can query these files in order to retrieve plaintext passwords. (CVE-2018-10871) In 389-ds-base up to version 1.4.1.2, requests are handled by workers threads. Each sockets will be waited by the worker for at most 'ioblocktimeout' seconds. However this timeout applies only for un- encrypted requests. Connections using SSL/TLS are not taking this timeout into account during reads, and may hang longer.An unauthenticated attacker could repeatedly create hanging LDAP requests to hang all the workers, resulting in a Denial of Service. (CVE-2019-3883) A flaw was found in the 'deref' plugin of 389-ds-base where it could use the 'search' permission to display attribute values. In some configurations, this could allow an authenticated attacker to view private attributes, such as password hashes. (CVE-2019-14824) There were conflicts between files from svrcore and 389-ds-base which prevented the installation of 389-ds (mga#25709) Affected Software/OS: '389-ds-base' package(s) on Mageia 7. Solution: Please install the updated package(s). CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2018-1054 BugTraq ID: 103228 http://www.securityfocus.com/bid/103228 https://lists.debian.org/debian-lts-announce/2018/07/msg00018.html RedHat Security Advisories: RHSA-2018:0414 https://access.redhat.com/errata/RHSA-2018:0414 RedHat Security Advisories: RHSA-2018:0515 https://access.redhat.com/errata/RHSA-2018:0515 Common Vulnerability Exposure (CVE) ID: CVE-2018-10871 https://lists.debian.org/debian-lts-announce/2018/08/msg00032.html RedHat Security Advisories: RHSA-2019:3401 https://access.redhat.com/errata/RHSA-2019:3401 Common Vulnerability Exposure (CVE) ID: CVE-2019-14824 RHSA-2019:3981 https://access.redhat.com/errata/RHSA-2019:3981 RHSA-2020:0464 https://access.redhat.com/errata/RHSA-2020:0464 [debian-lts-announce] 20191129 [SECURITY] [DLA 2004-1] 389-ds-base security update https://lists.debian.org/debian-lts-announce/2019/11/msg00036.html https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14824 https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html Common Vulnerability Exposure (CVE) ID: CVE-2019-3883 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3883 https://pagure.io/389-ds-base/issue/50329 https://pagure.io/389-ds-base/pull-request/50331 https://lists.debian.org/debian-lts-announce/2019/05/msg00008.html RedHat Security Advisories: RHSA-2019:1896 https://access.redhat.com/errata/RHSA-2019:1896 |
Copyright | Copyright (C) 2022 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |