[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2018-980 --- 389-ds-base

ID: oval:org.secpod.oval:def:1700016Date: (C)2018-04-02   (M)2023-12-20
Class: PATCHFamily: unix




Authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_malloc.c:It was found that 389-ds-base did not always handle internal hash comparison operations correctly during the authentication process. A remote, unauthenticated attacker could potentially use this flaw to bypass the authentication process under very rare and specific circumstances. Remote Denial of Service via search filters in SetUnicodeStringFromUTF_8 in collate.c:An out-of-bounds memory read flaw was found in the way 389-ds-base handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service

Platform:
Amazon Linux 2
Product:
389-ds-base
Reference:
ALAS2-2018-980
CVE-2017-15135
CVE-2018-1054
CVE    2
CVE-2017-15135
CVE-2018-1054
CPE    6
cpe:/a:fedoraproject:389_directory_server
cpe:/a:fedoraproject:389_directory_server:1.4.0.2
cpe:/a:fedoraproject:389_directory_server:1.4.0.1
cpe:/a:fedoraproject:389_directory_server:1.4.0.0
...

© SecPod Technologies