Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.881985
Category:CentOS Local Security Checks
Title:CentOS Update for 389-ds-base CESA-2014:1031 centos6
Summary:The remote host is missing an update for the '389-ds-base'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the '389-ds-base'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The 389 Directory Server is an LDAPv3 compliant server. The
base packages include the Lightweight Directory Access Protocol (LDAP) server
and command-line utilities for server administration.

It was found that when replication was enabled for each attribute in 389
Directory Server, which is the default configuration, the server returned
replicated metadata when the directory was searched while debugging was
enabled. A remote attacker could use this flaw to disclose potentially
sensitive information. (CVE-2014-3562)

This issue was discovered by Ludwig Krispenz of Red Hat.

All 389-ds-base users are advised to upgrade to these updated packages,
which contain a backported patch to correct this issue. After installing
this update, the 389 server service will be restarted automatically.

Affected Software/OS:
389-ds-base on CentOS 6

Solution:
Please install the updated packages.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-3562
RHSA-2014:1031
http://rhn.redhat.com/errata/RHSA-2014-1031.html
RHSA-2014:1032
http://rhn.redhat.com/errata/RHSA-2014-1032.html
https://bugzilla.redhat.com/show_bug.cgi?id=1123477
CopyrightCopyright (C) 2014 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.