ALAS2-2018-980


Amazon Linux 2 Security Advisory: ALAS-2018-980
Advisory Release Date: 2018-03-21 22:56 Pacific
Advisory Updated Date: 2018-03-26 22:10 Pacific
Severity: Important

Issue Overview:

Authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_malloc.c:
It was found that 389-ds-base did not always handle internal hash comparison operations correctly during the authentication process. A remote, unauthenticated attacker could potentially use this flaw to bypass the authentication process under very rare and specific circumstances. (CVE-2017-15135)

Remote Denial of Service (DoS) via search filters in SetUnicodeStringFromUTF_8 in collate.c:
An out-of-bounds memory read flaw was found in the way 389-ds-base handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service. (CVE-2018-1054)


Affected Packages:

389-ds-base


Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.


Issue Correction:
Run yum update 389-ds-base to update your system.

New Packages:
src:
    389-ds-base-1.3.6.1-28.amzn2.0.1.src

x86_64:
    389-ds-base-1.3.6.1-28.amzn2.0.1.x86_64
    389-ds-base-libs-1.3.6.1-28.amzn2.0.1.x86_64
    389-ds-base-devel-1.3.6.1-28.amzn2.0.1.x86_64
    389-ds-base-snmp-1.3.6.1-28.amzn2.0.1.x86_64
    389-ds-base-debuginfo-1.3.6.1-28.amzn2.0.1.x86_64