Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.882689
Category:CentOS Local Security Checks
Title:CentOS Update for 389-ds-base CESA-2017:0920 centos7
Summary:Check the version of 389-ds-base
Description:Summary:
Check the version of 389-ds-base

Vulnerability Insight:
389 Directory Server is an LDAP version 3
(LDAPv3) compliant server. The base packages include the Lightweight Directory
Access Protocol (LDAP) server and command-line utilities for server administration.

Security Fix(es):

* An invalid pointer dereference flaw was found in the way 389-ds-base
handled LDAP bind requests. A remote unauthenticated attacker could use
this flaw to make ns-slapd crash via a specially crafted LDAP bind request,
resulting in denial of service. (CVE-2017-2668)

Red Hat would like to thank Joachim Jabs (F24) for reporting this issue.

Bug Fix(es):

* Previously, when adding a filtered role definition that uses the 'nsrole'
virtual attribute in the filter, Directory Server terminated unexpectedly.
A patch has been applied, and now the roles plug-in ignores all virtual
attributes. As a result, an error message is logged when an invalid filter
is used. Additionally, the role is deactivated and Directory Server no
longer fails. (BZ#1429498)

* In a replication topology, Directory Server incorrectly calculated the
size of string format entries when a lot of entries were deleted. The
calculated size of entries was smaller than the actual required size.
Consequently, Directory Server allocated insufficient memory and terminated
unexpectedly when the data was written to it. With this update, the size of
string format entries is now calculated correctly in the described
situation and Directory Server no longer terminates unexpectedly.
(BZ#1429495)

Affected Software/OS:
389-ds-base on CentOS 7

Solution:
Please Install the Updated Packages.

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-2668
BugTraq ID: 97524
http://www.securityfocus.com/bid/97524
RedHat Security Advisories: RHSA-2017:0893
https://access.redhat.com/errata/RHSA-2017:0893
RedHat Security Advisories: RHSA-2017:0920
https://access.redhat.com/errata/RHSA-2017:0920
CopyrightCopyright (C) 2017 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.