Lucene search

K
centosCentOS ProjectCESA-2013:1752
HistoryNov 26, 2013 - 1:37 p.m.

389 security update

2013-11-2613:37:12
CentOS Project
lists.centos.org
45

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

EPSS

0.002

Percentile

64.8%

CentOS Errata and Security Advisory CESA-2013:1752

The 389 Directory Server is an LDAPv3 compliant server. The base packages
include the Lightweight Directory Access Protocol (LDAP) server and
command-line utilities for server administration.

It was discovered that the 389 Directory Server did not properly handle
certain Get Effective Rights (GER) search queries when the attribute list,
which is a part of the query, included several names using the ‘@’
character. An attacker able to submit search queries to the 389 Directory
Server could cause it to crash. (CVE-2013-4485)

All 389-ds-base users are advised to upgrade to these updated packages,
which contain a backported patch to correct this issue. After installing
this update, the 389 server service will be restarted automatically.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-cr-announce/2013-November/027393.html

Affected packages:
389-ds-base
389-ds-base-devel
389-ds-base-libs

Upstream details at:
https://access.redhat.com/errata/RHSA-2013:1752

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

EPSS

0.002

Percentile

64.8%