openSUSE Security Update : 389-ds (openSUSE-2017-1396)

critical Nessus Plugin ID 105366

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for 389-ds fixes the following issues :

- CVE-2017-7551: 389-ds-base: Password brute-force possible for locked account due to different return codes (bsc#1051997)

- CVE-2016-4992: 389-ds: Information disclosure via repeated use of LDAP ADD operation (bsc#997256)

- CVE-2016-5405: 389-ds: Password verification vulnerable to timing attack (bsc#1007004)

- CVE-2017-2591: 389-ds-base: Heap buffer overflow in uiduniq.c (bsc#1020670)

- CVE-2017-2668 389-ds Remote crash via crafted LDAP messages (bsc#1069067)

- CVE-2016-0741: 389-ds: worker threads do not detect abnormally closed connections causing DoS (bsc#1069074)

Solution

Update the affected 389-ds packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1007004

https://bugzilla.opensuse.org/show_bug.cgi?id=1020670

https://bugzilla.opensuse.org/show_bug.cgi?id=1051997

https://bugzilla.opensuse.org/show_bug.cgi?id=1069067

https://bugzilla.opensuse.org/show_bug.cgi?id=1069074

https://bugzilla.opensuse.org/show_bug.cgi?id=997256

Plugin Details

Severity: Critical

ID: 105366

File Name: openSUSE-2017-1396.nasl

Version: 3.4

Type: local

Agent: unix

Published: 12/19/2017

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:389-ds, p-cpe:/a:novell:opensuse:389-ds-debuginfo, p-cpe:/a:novell:opensuse:389-ds-debugsource, p-cpe:/a:novell:opensuse:389-ds-devel, cpe:/o:novell:opensuse:42.2, cpe:/o:novell:opensuse:42.3

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 12/18/2017

Reference Information

CVE: CVE-2016-0741, CVE-2016-4992, CVE-2016-5405, CVE-2017-2591, CVE-2017-2668, CVE-2017-7551