Amazon Linux 1 Security Advisory: ALAS-2018-980
Advisory Release Date: 2018-04-05 15:55 Pacific
Advisory Updated Date: 2018-04-05 23:07 Pacific
Authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_malloc.c:
It was found that 389-ds-base did not always handle internal hash comparison operations correctly during the authentication process. A remote, unauthenticated attacker could potentially use this flaw to bypass the authentication process under very rare and specific circumstances. (CVE-2017-15135)
Remote Denial of Service (DoS) via search filters in SetUnicodeStringFromUTF_8 in collate.c:
An out-of-bounds memory read flaw was found in the way 389-ds-base handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service. (CVE-2018-1054 )
Affected Packages:
389-ds-base
Issue Correction:
Run yum update 389-ds-base to update your system.
i686:
389-ds-base-1.3.6.1-28.54.amzn1.i686
389-ds-base-snmp-1.3.6.1-28.54.amzn1.i686
389-ds-base-debuginfo-1.3.6.1-28.54.amzn1.i686
389-ds-base-libs-1.3.6.1-28.54.amzn1.i686
389-ds-base-devel-1.3.6.1-28.54.amzn1.i686
src:
389-ds-base-1.3.6.1-28.54.amzn1.src
x86_64:
389-ds-base-devel-1.3.6.1-28.54.amzn1.x86_64
389-ds-base-snmp-1.3.6.1-28.54.amzn1.x86_64
389-ds-base-1.3.6.1-28.54.amzn1.x86_64
389-ds-base-debuginfo-1.3.6.1-28.54.amzn1.x86_64
389-ds-base-libs-1.3.6.1-28.54.amzn1.x86_64