Amazon Linux 2 Security Advisory: ALAS-2018-980
Advisory Release Date: 2018-03-21 22:56 Pacific
Advisory Updated Date: 2018-03-26 22:10 Pacific
Authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_malloc.c:
It was found that 389-ds-base did not always handle internal hash comparison operations correctly during the authentication process. A remote, unauthenticated attacker could potentially use this flaw to bypass the authentication process under very rare and specific circumstances. (CVE-2017-15135)
Remote Denial of Service (DoS) via search filters in SetUnicodeStringFromUTF_8 in collate.c:
An out-of-bounds memory read flaw was found in the way 389-ds-base handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service. (CVE-2018-1054)
Affected Packages:
389-ds-base
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update 389-ds-base to update your system.
src:
389-ds-base-1.3.6.1-28.amzn2.0.1.src
x86_64:
389-ds-base-1.3.6.1-28.amzn2.0.1.x86_64
389-ds-base-libs-1.3.6.1-28.amzn2.0.1.x86_64
389-ds-base-devel-1.3.6.1-28.amzn2.0.1.x86_64
389-ds-base-snmp-1.3.6.1-28.amzn2.0.1.x86_64
389-ds-base-debuginfo-1.3.6.1-28.amzn2.0.1.x86_64