Important: 389-ds-base

2018-02-21T20:43:00
ID ALAS-2018-955
Type amazon
Reporter Amazon
Modified 2018-02-21T20:43:00

Description

Issue Overview:

Remote DoS via search filters in slapi_filter_sprintf in slapd/util.c
A stack buffer overflow flaw was found in the way 389-ds-base handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.(CVE-2017-15134 __)

Affected Packages:

389-ds-base

Issue Correction:
Run yum update 389-ds-base to update your system.

New Packages:

i686:  
    389-ds-base-snmp-1.3.6.1-26.52.amzn1.i686  
    389-ds-base-libs-1.3.6.1-26.52.amzn1.i686  
    389-ds-base-devel-1.3.6.1-26.52.amzn1.i686  
    389-ds-base-1.3.6.1-26.52.amzn1.i686  
    389-ds-base-debuginfo-1.3.6.1-26.52.amzn1.i686

src:  
    389-ds-base-1.3.6.1-26.52.amzn1.src

x86_64:  
    389-ds-base-libs-1.3.6.1-26.52.amzn1.x86_64  
    389-ds-base-snmp-1.3.6.1-26.52.amzn1.x86_64  
    389-ds-base-1.3.6.1-26.52.amzn1.x86_64  
    389-ds-base-debuginfo-1.3.6.1-26.52.amzn1.x86_64  
    389-ds-base-devel-1.3.6.1-26.52.amzn1.x86_64