5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
7.4 High
AI Score
Confidence
High
0.008 Low
EPSS
Percentile
81.4%
Issue Overview:
Authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_malloc.c:
It was found that 389-ds-base did not always handle internal hash comparison operations correctly during the authentication process. A remote, unauthenticated attacker could potentially use this flaw to bypass the authentication process under very rare and specific circumstances. (CVE-2017-15135)
Remote Denial of Service (DoS) via search filters in SetUnicodeStringFromUTF_8 in collate.c:
An out-of-bounds memory read flaw was found in the way 389-ds-base handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service. (CVE-2018-1054)
Affected Packages:
389-ds-base
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update 389-ds-base to update your system.
New Packages:
src:
389-ds-base-1.3.6.1-28.amzn2.0.1.src
x86_64:
389-ds-base-1.3.6.1-28.amzn2.0.1.x86_64
389-ds-base-libs-1.3.6.1-28.amzn2.0.1.x86_64
389-ds-base-devel-1.3.6.1-28.amzn2.0.1.x86_64
389-ds-base-snmp-1.3.6.1-28.amzn2.0.1.x86_64
389-ds-base-debuginfo-1.3.6.1-28.amzn2.0.1.x86_64
Red Hat: CVE-2017-15135, CVE-2018-1054
Mitre: CVE-2017-15135, CVE-2018-1054
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 2 | x86_64 | 389-ds-base | < 1.3.6.1-28.amzn2.0.1 | 389-ds-base-1.3.6.1-28.amzn2.0.1.x86_64.rpm |
Amazon Linux | 2 | x86_64 | 389-ds-base-libs | < 1.3.6.1-28.amzn2.0.1 | 389-ds-base-libs-1.3.6.1-28.amzn2.0.1.x86_64.rpm |
Amazon Linux | 2 | x86_64 | 389-ds-base-devel | < 1.3.6.1-28.amzn2.0.1 | 389-ds-base-devel-1.3.6.1-28.amzn2.0.1.x86_64.rpm |
Amazon Linux | 2 | x86_64 | 389-ds-base-snmp | < 1.3.6.1-28.amzn2.0.1 | 389-ds-base-snmp-1.3.6.1-28.amzn2.0.1.x86_64.rpm |
Amazon Linux | 2 | x86_64 | 389-ds-base-debuginfo | < 1.3.6.1-28.amzn2.0.1 | 389-ds-base-debuginfo-1.3.6.1-28.amzn2.0.1.x86_64.rpm |
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
7.4 High
AI Score
Confidence
High
0.008 Low
EPSS
Percentile
81.4%