ALAS-2018-980


Amazon Linux AMI Security Advisory: ALAS-2018-980
Advisory Release Date: 2018-04-05 15:55 Pacific
Severity: Important

Issue Overview:

Authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_malloc.c:
It was found that 389-ds-base did not always handle internal hash comparison operations correctly during the authentication process. A remote, unauthenticated attacker could potentially use this flaw to bypass the authentication process under very rare and specific circumstances. (CVE-2017-15135 )

Remote Denial of Service (DoS) via search filters in SetUnicodeStringFromUTF_8 in collate.c:
An out-of-bounds memory read flaw was found in the way 389-ds-base handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service. (CVE-2018-1054 )


Affected Packages:

389-ds-base


Issue Correction:
Run yum update 389-ds-base to update your system.

New Packages:
i686:
    389-ds-base-1.3.6.1-28.54.amzn1.i686
    389-ds-base-snmp-1.3.6.1-28.54.amzn1.i686
    389-ds-base-debuginfo-1.3.6.1-28.54.amzn1.i686
    389-ds-base-libs-1.3.6.1-28.54.amzn1.i686
    389-ds-base-devel-1.3.6.1-28.54.amzn1.i686

src:
    389-ds-base-1.3.6.1-28.54.amzn1.src

x86_64:
    389-ds-base-devel-1.3.6.1-28.54.amzn1.x86_64
    389-ds-base-snmp-1.3.6.1-28.54.amzn1.x86_64
    389-ds-base-1.3.6.1-28.54.amzn1.x86_64
    389-ds-base-debuginfo-1.3.6.1-28.54.amzn1.x86_64
    389-ds-base-libs-1.3.6.1-28.54.amzn1.x86_64