|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for 389-ds-base RHSA-2013:1752-01|
|Summary:||The remote host is missing an update for the '389-ds-base'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the '389-ds-base'
package(s) announced via the referenced advisory.
The 389 Directory Server is an LDAPv3 compliant server. The base packages
include the Lightweight Directory Access Protocol (LDAP) server and
command-line utilities for server administration.
It was discovered that the 389 Directory Server did not properly handle
certain Get Effective Rights (GER) search queries when the attribute list,
which is a part of the query, included several names using the '@'
character. An attacker able to submit search queries to the 389 Directory
Server could cause it to crash. (CVE-2013-4485)
All 389-ds-base users are advised to upgrade to these updated packages,
which contain a backported patch to correct this issue. After installing
this update, the 389 server service will be restarted automatically.
389-ds-base on Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2013-4485|
RedHat Security Advisories: RHSA-2013:1752
RedHat Security Advisories: RHSA-2013:1753
|Copyright||Copyright (C) 2013 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.