Executive Summary
Summary | |
---|---|
Title | 389-ds-base security, bug fix, and enhancement update |
Informations | |||
---|---|---|---|
Name | RHSA-2016:2594 | First vendor Publication | 2016-11-03 |
Vendor | RedHat | Last vendor Modification | 2016-11-03 |
Severity (Vendor) | N/A | Revision | 02 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: An update for 389-ds-base is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64le, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. The following packages have been upgraded to a newer upstream version: 389-ds-base (1.3.5.10). (BZ#1270020) Security Fix(es): * It was found that 389 Directory Server was vulnerable to a flaw in which the default ACI (Access Control Instructions) could be read by an anonymous user. This could lead to leakage of sensitive information. (CVE-2016-5416) * An information disclosure flaw was found in 389 Directory Server. A user with no access to objects in certain LDAP sub-tree could send LDAP ADD operations with a specific object name. The error message returned to the user was different based on whether the target object existed or not. (CVE-2016-4992) * It was found that 389 Directory Server was vulnerable to a remote password disclosure via timing attack. A remote attacker could possibly use this flaw to retrieve directory server password after many tries. (CVE-2016-5405) The CVE-2016-5416 issue was discovered by Viktor Ashirov (Red Hat); the CVE-2016-4992 issue was discovered by Petr Spacek (Red Hat) and Martin Basti (Red Hat); and the CVE-2016-5405 issue was discovered by William Brown (Red Hat). Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.3 Release Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing this update, the 389 server service will be restarted automatically. 5. Bugs fixed (https://bugzilla.redhat.com/): 190862 - [RFE] Default password syntax settings don't work with fine-grained policies 1018944 - [RFE] Enhance password change tracking 1143066 - [RFE] The dirsrv user/group should be created in rpm %pre, and ideally with fixed uid/gid 1160902 - search, matching rules and filter error "unsupported type 0xA9" 1196282 - substring index with nssubstrbegin: 1 is not being used with filters like (attr=x*) 1209128 - [RFE] Add a utility to get the status of Directory Server instances 1210842 - Add PIDFile option to systemd service file 1223510 - nsslapd-maxbersize should be ignored in replication 1229799 - 389-ds-base: ldclt-bin killed by SIGSEGV 1249908 - No validation check for the value for nsslapd-db-locks. 1254887 - No man page entry for - option '-u' of dbgen.pl for adding group entries with uniquemembers 1255557 - db2index creates index entry from deleted records 1257568 - /usr/lib64/dirsrv/libnunc-stans.so is owned by both -libs and -devel 1258610 - total update request must not be lost 1258611 - dna plugin needs to handle binddn groups for authorization 1259950 - Add config setting to MemberOf Plugin to add required objectclass got memberOf attribute 1266510 - Linked Attributes plug-in - wrong behaviour when adding valid and broken links 1266532 - Linked Attributes plug-in - won't update links after MODRDN operation 1267750 - pagedresults - when timed out, search results could have been already freed. 1269378 - ds-logpipe.py with wrong arguments - python exception in the output 1270020 - Rebase 389-ds-base to 1.3.5 in RHEL-7.3 1271330 - nunc-stans: Attempt to release connection that is not acquired 1273142 - crash in Managed Entry plugin 1273549 - [RFE] Improve timestamp resolution in logs 1273550 - Deadlock between two MODs on the same entry between entry cache and backend lock 1273555 - deadlock in mep delete post op 1275763 - [RFE] add setup-ds.pl option to disable instance specific scripts 1278567 - SimplePagedResults -- abandon could happen between the abandon check and sending results 1278584 - Share nsslapd-threadnumber in the case nunc-stans is enabled, as well. 1278755 - deadlock on connection mutex 1278987 - Cannot upgrade a consumer to supplier in a multimaster environment 1280123 - acl - regression - trailing ', (comma)' in macro matched value is not removed. 1280456 - setup-ds should detect if port is already defined 1288229 - many attrlist_replace errors in connection with cleanallruv 1290101 - proxyauth support does not work when bound as directory manager 1290111 - [RFE] Support for rfc3673 '+' to return operational attributes 1290141 - With exhausted range, part of DNA shared configuration is deleted after server restart 1290242 - SimplePagedResults -- in the search error case, simple paged results slot was not released. 1290600 - The 'eq' index does not get updated properly when deleting and re-adding attributes in the same ldapmodify operation 1296310 - ldclt - segmentation fault error while binding 1301097 - logconv.pl displays negative operation speeds 1302823 - Crash in slapi_get_object_extension 1303641 - heap corruption at schema replication. 1303794 - Import readNSState.py from RichM's repo 1304682 - "stale" automember rule (associated to a removed group) causes discrepancies in the database 1307151 - keep alive entries can break replication 1310848 - Supplier can skip a failing update, although it should retry. 1312557 - dirsrv service fails to start when nsslapd-listenhost is configured 1314557 - change severity of some messages related to "keep alive" entries 1314956 - moving an entry cause next on-line init to skip entry has no parent, ending at line 0 of file "(bulk import)" 1315893 - License tag does not match actual license of code 1316328 - search returns no entry when OR filter component contains non readable attribute 1316580 - dirsrv service doesn't ask for pin when pin.txt is missing 1316731 - syncrepl search returning error 329; plugin sending a bad error code 1316741 - ldctl should support -H with ldap uris 1316742 - no plugin calls in tombstone purging 1319329 - add nsslapd-auditlog-logging-enabled: off to template-dse.ldif 1320295 - If nsSSL3 is on, even if SSL v3 is not really enabled, a confusing message is logged. 1320715 - DES to AES password conversion fails if a backend is empty 1321124 - Replication changelog can incorrectly skip over updates 1326077 - Page result search should return empty cookie if there is no returned entry 1326520 - db2index uses a buffer size derived from dbcachesize 1328936 - objectclass values could be dropped on the consumer 1329061 - 389-ds-base-1.3.4.0-29.el7_2 "hang" 1331343 - Paged results search returns the blank list of entries 1332533 - ns-accountstatus.pl gives error message on execution along with results. 1332709 - password history is not updated when an admin resets the password 1333184 - (389-ds-base-1.3.5) Fixing coverity issues. 1333515 - Enable DS to offer weaker DH params in NSS 1334455 - db2ldif is not taking into account multiple suffixes or backends 1335492 - Modifier's name is not recorded in the audit log with modrdn and moddn operations 1335618 - Server ram sanity checks work in isolation 1338872 - Wrong result code display in audit-failure log 1340307 - Running db2index with no options breaks replication 1342609 - At startup DES to AES password conversion causes timeout in start script 1344414 - [RFE] adding pre/post extop ability 1347760 - CVE-2016-4992 389-ds-base: Information disclosure via repeated use of LDAP ADD operation 1349540 - CVE-2016-5416 389-ds-base: ACI readable by anonymous user 1349571 - Improve MMR replication convergence 1349577 - Values of dbcachetries/dbcachehits in cn=monitor could overflow. 1350632 - ns-slapd shutdown crashes if pwdstorageschema name is from stack. 1353592 - Setup-ds.pl --update fails 1353629 - DS shuts down automatically if dnaThreshold is set to 0 in a MMR setup 1353714 - If a cipher is disabled, do not attempt to look it up 1354374 - Upgrade to 389-ds-base >= 1.3.5.5 doesn't install 389-ds-base-snmp 1354660 - flow control in replication also blocks receiving results 1355879 - nunc-stans: ns-slapd crashes during startup with SIGILL on AMD Opteron 280 1356261 - Fixup tombstone task needs to set proper flag when updating tombstones 1358865 - CVE-2016-5405 389-ds-base: Password verification vulnerable to timing attack 1360327 - remove-ds.pl deletes an instance even if wrong prefix was specified 1360447 - nsslapd-workingdir is empty when ns-slapd is started by systemd 1361134 - When fine-grained policy is applied, a sub-tree has a priority over a user while changing password 1361321 - Duplicate collation entries 1364190 - Change example in /etc/sysconfig/dirsrv to use tcmalloc 1368520 - Crash in import_wait_for_space_in_fifo(). 1368956 - man page of ns-accountstatus.pl shows redundant entries for -p port option 1369537 - passwordMinAge attribute doesn't limit the minimum age of the password 1369570 - cleanallruv changelog cleaning incorrectly impacts all backends 1370300 - set proper update status to replication agreement in case of failure 1371283 - Server Side Sorting crashes the server. 1371284 - Disabling CLEAR password storage scheme will crash server when setting a password |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2016-2594.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
67 % | CWE-200 | Information Exposure |
33 % | CWE-199 | Information Management Errors |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 2 | |
Os | 2 | |
Os | 2 | |
Os | 2 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-12-16 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2016-773.nasl - Type : ACT_GATHER_INFO |
2016-12-15 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20161103_389_ds_base_on_SL7_x.nasl - Type : ACT_GATHER_INFO |
2016-11-28 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2016-2594.nasl - Type : ACT_GATHER_INFO |
2016-11-22 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20161115_389_ds_base_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2016-11-21 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2016-2765.nasl - Type : ACT_GATHER_INFO |
2016-11-21 | Name : The remote Fedora host is missing a security update. File : fedora_2016-8f9d466bcc.nasl - Type : ACT_GATHER_INFO |
2016-11-16 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2016-2765.nasl - Type : ACT_GATHER_INFO |
2016-11-16 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2016-2765.nasl - Type : ACT_GATHER_INFO |
2016-11-11 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2016-2594.nasl - Type : ACT_GATHER_INFO |
2016-11-07 | Name : The remote Fedora host is missing a security update. File : fedora_2016-8660c7656f.nasl - Type : ACT_GATHER_INFO |
2016-11-04 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2016-2594.nasl - Type : ACT_GATHER_INFO |
2016-09-08 | Name : The remote Fedora host is missing a security update. File : fedora_2016-b1a36cccc8.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2017-06-16 21:24:30 |
|
2017-06-09 00:24:19 |
|
2016-11-29 13:23:41 |
|
2016-11-12 13:25:32 |
|
2016-11-05 13:24:39 |
|
2016-11-03 13:22:43 |
|