The remote host is missing an update for the 'compat-openldap' package(s) announced via the referenced advisory. OpenLDAP suite is an open source suite of LDAP applications and development tools. A flaw was found in the way OpenLDAP handled authentication failures. Multiple concurrent connections to an OpenLDAP server could cause the slapd service to terminate unexpectedly with an assertion error. CentOS Update for compat-openldap CESA-2011:0346 centos5 x86_64
Reporter | Title | Published | Views | Family All 60 |
---|---|---|---|---|
![]() | CVE-2011-1024 | 20 Mar 201101:00 | – | cvelist |
![]() | RedHat Update for openldap RHSA-2011:0346-01 | 15 Mar 201100:00 | – | openvas |
![]() | CentOS Update for compat-openldap CESA-2011:0346 centos5 i386 | 9 Aug 201100:00 | – | openvas |
![]() | RedHat Update for openldap RHSA-2011:0346-01 | 15 Mar 201100:00 | – | openvas |
![]() | CentOS Update for compat-openldap CESA-2011:0346 centos5 x86_64 | 30 Jul 201200:00 | – | openvas |
![]() | CentOS Update for compat-openldap CESA-2011:0346 centos5 i386 | 9 Aug 201100:00 | – | openvas |
![]() | Oracle: Security Advisory (ELSA-2011-0346) | 6 Oct 201500:00 | – | openvas |
![]() | Mandriva Update for openldap MDVSA-2011:055 (openldap) | 1 Apr 201100:00 | – | openvas |
![]() | Mandriva Update for openldap MDVSA-2011:055 (openldap) | 1 Apr 201100:00 | – | openvas |
![]() | Mandriva Update for openldap MDVSA-2011:056 (openldap) | 1 Apr 201100:00 | – | openvas |
# SPDX-FileCopyrightText: 2012 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_xref(name:"URL", value:"http://lists.centos.org/pipermail/centos-announce/2011-April/017376.html");
script_oid("1.3.6.1.4.1.25623.1.0.881455");
script_version("2023-07-10T08:07:43+0000");
script_tag(name:"last_modification", value:"2023-07-10 08:07:43 +0000 (Mon, 10 Jul 2023)");
script_tag(name:"creation_date", value:"2012-07-30 17:54:49 +0530 (Mon, 30 Jul 2012)");
script_cve_id("CVE-2011-1024");
script_tag(name:"cvss_base", value:"4.6");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:H/Au:S/C:P/I:P/A:P");
script_xref(name:"CESA", value:"2011:0346");
script_name("CentOS Update for compat-openldap CESA-2011:0346 centos5 x86_64");
script_tag(name:"summary", value:"The remote host is missing an update for the 'compat-openldap'
package(s) announced via the referenced advisory.");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2012 Greenbone AG");
script_family("CentOS Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/centos", "ssh/login/rpms", re:"ssh/login/release=CentOS5");
script_tag(name:"affected", value:"compat-openldap on CentOS 5");
script_tag(name:"solution", value:"Please install the updated packages.");
script_tag(name:"insight", value:"OpenLDAP is an open source suite of LDAP (Lightweight Directory Access
Protocol) applications and development tools.
A flaw was found in the way OpenLDAP handled authentication failures being
passed from an OpenLDAP slave to the master. If OpenLDAP was configured
with a chain overlay and it forwarded authentication failures, OpenLDAP
would bind to the directory as an anonymous user and return success, rather
than return failure on the authenticated bind. This could allow a user on a
system that uses LDAP for authentication to log into a directory-based
account without knowing the password. (CVE-2011-1024)
This update also fixes the following bug:
* Previously, multiple concurrent connections to an OpenLDAP server could
cause the slapd service to terminate unexpectedly with an assertion error.
This update adds mutexes to protect multiple threads from accessing a
structure with a connection, and the slapd service no longer crashes.
(BZ#677611)
Users of OpenLDAP should upgrade to these updated packages, which contain
backported patches to resolve these issues. After installing this update,
the OpenLDAP daemons will be restarted automatically.");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
if(release == "CentOS5")
{
if ((res = isrpmvuln(pkg:"compat-openldap", rpm:"compat-openldap~2.3.43_2.2.29~12.el5_6.7", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"openldap", rpm:"openldap~2.3.43~12.el5_6.7", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"openldap-clients", rpm:"openldap-clients~2.3.43~12.el5_6.7", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"openldap-devel", rpm:"openldap-devel~2.3.43~12.el5_6.7", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"openldap-servers", rpm:"openldap-servers~2.3.43~12.el5_6.7", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"openldap-servers-overlays", rpm:"openldap-servers-overlays~2.3.43~12.el5_6.7", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"openldap-servers-sql", rpm:"openldap-servers-sql~2.3.43~12.el5_6.7", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99);
exit(0);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo