Description: | Description: The remote host is missing an update to openldap announced via advisory FEDORA-2011-3612.
Update Information:
Three security issues were fixed during the rebase!
Changes not covered by bugs:
- new: system resource limiting for slapd using ulimit - fix: possible null pointer dereference in NSS implementation OpenLDAP package was rebased to 2.4.24.
Extension of API:
* libldap adds: ldap_destroy ldap_dup ldap_sasl_interactive_bind * libldif adds: ldif_put_wrap ldif_sput_wrap
References:
[ 1 ] Bug #680466 - CVE-2011-1024 openldap: forwarded bind failure messages cause success https://bugzilla.redhat.com/show_bug.cgi?id=680466 [ 2 ] Bug #680472 - CVE-2011-1025 openldap: rootpw not verified via slapd.conf when using the NDB backend https://bugzilla.redhat.com/show_bug.cgi?id=680472 [ 3 ] Bug #680975 - CVE-2011-1081 openldap: DoS when submitting special MODRDN request https://bugzilla.redhat.com/show_bug.cgi?id=680975
Solution: Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update openldap' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2011-3612
Risk factor : High
CVSS Score: 6.8
|