Lucene search

K
symantecSymantec Security ResponseSMNTC-110751
HistoryNov 04, 2019 - 12:00 a.m.

Red Hat '389-ds-base' CVE-2019-14824 Security Bypass Vulnerability

2019-11-0400:00:00
Symantec Security Response
www.symantec.com
16

0.002 Low

EPSS

Percentile

56.7%

Description

Red Hat ‘389-ds-base’ is prone to a security-bypass vulnerability. Attackers can exploit this issue to bypass certain security restrictions, obtain sensitive information and perform unauthorized actions. This may aid in further attacks.

Technologies Affected

  • Redhat 389-ds-base
  • Redhat Enterprise Linux for ARM 64 8
  • Redhat Enterprise Linux for IBM z Systems 8
  • Redhat Enterprise Linux for Power little endian 8
  • Redhat Enterprise Linux for x86_64 8

Recommendations

Block external access at the network boundary, unless external parties require service.
If global access isn’t needed, filter access to the affected computer at the network boundary. Restricting access to only trusted computers and networks might greatly reduce the likelihood of successful exploits.

Run all software as a nonprivileged user with minimal access rights.
To reduce the impact of latent vulnerabilities, always run nonadministrative software as an unprivileged user with minimal access rights.

Deploy network intrusion detection systems to monitor network traffic for malicious activity.
Deploy NIDS to monitor network traffic for signs of anomalous or suspicious activity. This includes but is not limited to requests that include NOP sleds and unexplained incoming and outgoing traffic. This will reduce the likelihood of these issues being exploited.

Updates are available. Please see the references or vendor advisory for more information.