RHEL 7 : 389-ds-base (RHSA-2015:0416)

medium Nessus Plugin ID 81634

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2015:0416 advisory.

The 389 Directory Server is an LDAPv3 compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.

An information disclosure flaw was found in the way the 389 Directory Server stored information in the Changelog that is exposed via the 'cn=changelog' LDAP sub-tree. An unauthenticated user could in certain cases use this flaw to read data from the Changelog, which could include sensitive information such as plain-text passwords.
(CVE-2014-8105)

It was found that when the nsslapd-unhashed-pw-switch 389 Directory Server configuration option was set to off, it did not prevent the writing of unhashed passwords into the Changelog. This could potentially allow an authenticated user able to access the Changelog to read sensitive information. (CVE-2014-8112)

The CVE-2014-8105 issue was discovered by Petr paek of the Red Hat Identity Management Engineering Team, and the CVE-2014-8112 issue was discovered by Ludwig Krispenz of the Red Hat Identity Management Engineering Team.

Enhancements:

* Added new WinSync configuration parameters: winSyncSubtreePair for synchronizing multiple subtrees, as well as winSyncWindowsFilter and winSyncDirectoryFilter for synchronizing restricted sets by filters.
(BZ#746646)

* It is now possible to stop, start, or configure plug-ins without the need to restart the server for the change to take effect. (BZ#994690)

* Access control related to the MODDN and MODRDN operations has been updated: the source and destination targets can be specified in the same access control instruction. (BZ#1118014)

* The nsDS5ReplicaBindDNGroup attribute for using a group distinguished name in binding to replicas has been added. (BZ#1052754)

* WinSync now supports range retrieval. If more than the MaxValRange number of attribute values exist per attribute, WinSync synchronizes all the attributes to the directory server using the range retrieval.
(BZ#1044149)

* Support for the RFC 4527 Read Entry Controls and RFC 4533 Content Synchronization Operation LDAP standards has been added. (BZ#1044139, BZ#1044159)

* The Referential Integrity (referint) plug-in can now use an alternate configuration area. The PlugInArg plug-in configuration now uses unique configuration attributes. Configuration changes no longer require a server restart. (BZ#1044203)

* The logconv.pl log analysis tool now supports gzip, bzip2, and xz compressed files and also TAR archives and compressed TAR archives of these files. (BZ#1044188)

* Only the Directory Manager could add encoded passwords or force users to change their password after a reset. Users defined in the passwordAdminDN attribute can now also do this. (BZ#1118007)

* The nsslapd-memberofScope configuration parameter has been added to the MemberOf plug-in. With MemberOf enabled and a scope defined, moving a group out of scope with a MODRDN operation failed. Moving a member entry out of scope now correctly removes the memberof value. (BZ#1044170)

* The alwaysRecordLoginAttr attribute has been addded to the Account Policy plug-in configuration entry, which allows to distinguish between an attribute for checking the activity of an account and an attribute to be updated at successful login. (BZ#1060032)

* A root DSE search, using the ldapsearch command with the '-s base -b ' options, returns only the user attributes instead of the operational attributes. The nsslapd-return-default option has been added for backward compatibility. (BZ#1118021)

* The configuration of the MemberOf plug-in can be stored in a suffix mapped to a back-end database, which allows MemberOf configuration to be replicated. (BZ#1044205)

* Added support for the SSL versions from the range supported by the NSS library available on the system.
Due to the POODLE vulnerability, SSLv3 is disabled by default even if NSS supports it. (BZ#1044191)

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected 389-ds-base, 389-ds-base-devel and / or 389-ds-base-libs packages.

See Also

http://www.nessus.org/u?18d9d505

https://access.redhat.com/errata/RHSA-2015:0416

https://access.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=1012991

https://bugzilla.redhat.com/show_bug.cgi?id=1013736

https://bugzilla.redhat.com/show_bug.cgi?id=1014380

https://bugzilla.redhat.com/show_bug.cgi?id=1024541

https://bugzilla.redhat.com/show_bug.cgi?id=1029959

https://bugzilla.redhat.com/show_bug.cgi?id=1031216

https://bugzilla.redhat.com/show_bug.cgi?id=1044133

https://bugzilla.redhat.com/show_bug.cgi?id=1044134

https://bugzilla.redhat.com/show_bug.cgi?id=1044135

https://bugzilla.redhat.com/show_bug.cgi?id=1044137

https://bugzilla.redhat.com/show_bug.cgi?id=1044138

https://bugzilla.redhat.com/show_bug.cgi?id=1044139

https://bugzilla.redhat.com/show_bug.cgi?id=1044140

https://bugzilla.redhat.com/show_bug.cgi?id=1044141

https://bugzilla.redhat.com/show_bug.cgi?id=1044142

https://bugzilla.redhat.com/show_bug.cgi?id=1044143

https://bugzilla.redhat.com/show_bug.cgi?id=1044144

https://bugzilla.redhat.com/show_bug.cgi?id=1044146

https://bugzilla.redhat.com/show_bug.cgi?id=1044147

https://bugzilla.redhat.com/show_bug.cgi?id=1044148

https://bugzilla.redhat.com/show_bug.cgi?id=1044149

https://bugzilla.redhat.com/show_bug.cgi?id=1044150

https://bugzilla.redhat.com/show_bug.cgi?id=1044151

https://bugzilla.redhat.com/show_bug.cgi?id=1044152

https://bugzilla.redhat.com/show_bug.cgi?id=1044153

https://bugzilla.redhat.com/show_bug.cgi?id=1044154

https://bugzilla.redhat.com/show_bug.cgi?id=1044156

https://bugzilla.redhat.com/show_bug.cgi?id=1044157

https://bugzilla.redhat.com/show_bug.cgi?id=1044159

https://bugzilla.redhat.com/show_bug.cgi?id=1044160

https://bugzilla.redhat.com/show_bug.cgi?id=1044162

https://bugzilla.redhat.com/show_bug.cgi?id=1044163

https://bugzilla.redhat.com/show_bug.cgi?id=1044164

https://bugzilla.redhat.com/show_bug.cgi?id=1044168

https://bugzilla.redhat.com/show_bug.cgi?id=1044169

https://bugzilla.redhat.com/show_bug.cgi?id=1044170

https://bugzilla.redhat.com/show_bug.cgi?id=1044171

https://bugzilla.redhat.com/show_bug.cgi?id=1044172

https://bugzilla.redhat.com/show_bug.cgi?id=1044173

https://bugzilla.redhat.com/show_bug.cgi?id=1044177

https://bugzilla.redhat.com/show_bug.cgi?id=1044179

https://bugzilla.redhat.com/show_bug.cgi?id=1044180

https://bugzilla.redhat.com/show_bug.cgi?id=1044181

https://bugzilla.redhat.com/show_bug.cgi?id=1044183

https://bugzilla.redhat.com/show_bug.cgi?id=1044185

https://bugzilla.redhat.com/show_bug.cgi?id=1044187

https://bugzilla.redhat.com/show_bug.cgi?id=1044188

https://bugzilla.redhat.com/show_bug.cgi?id=1044191

https://bugzilla.redhat.com/show_bug.cgi?id=1044193

https://bugzilla.redhat.com/show_bug.cgi?id=1044194

https://bugzilla.redhat.com/show_bug.cgi?id=1044196

https://bugzilla.redhat.com/show_bug.cgi?id=1044198

https://bugzilla.redhat.com/show_bug.cgi?id=1044202

https://bugzilla.redhat.com/show_bug.cgi?id=1044203

https://bugzilla.redhat.com/show_bug.cgi?id=1044205

https://bugzilla.redhat.com/show_bug.cgi?id=1044210

https://bugzilla.redhat.com/show_bug.cgi?id=1044211

https://bugzilla.redhat.com/show_bug.cgi?id=1044212

https://bugzilla.redhat.com/show_bug.cgi?id=1044213

https://bugzilla.redhat.com/show_bug.cgi?id=1044215

https://bugzilla.redhat.com/show_bug.cgi?id=1044216

https://bugzilla.redhat.com/show_bug.cgi?id=1048980

https://bugzilla.redhat.com/show_bug.cgi?id=1049030

https://bugzilla.redhat.com/show_bug.cgi?id=1052751

https://bugzilla.redhat.com/show_bug.cgi?id=1052754

https://bugzilla.redhat.com/show_bug.cgi?id=1057803

https://bugzilla.redhat.com/show_bug.cgi?id=1061060

https://bugzilla.redhat.com/show_bug.cgi?id=1063990

https://bugzilla.redhat.com/show_bug.cgi?id=1064006

https://bugzilla.redhat.com/show_bug.cgi?id=1064986

https://bugzilla.redhat.com/show_bug.cgi?id=1067090

https://bugzilla.redhat.com/show_bug.cgi?id=1072032

https://bugzilla.redhat.com/show_bug.cgi?id=1074306

https://bugzilla.redhat.com/show_bug.cgi?id=1074447

https://bugzilla.redhat.com/show_bug.cgi?id=1076729

https://bugzilla.redhat.com/show_bug.cgi?id=1077884

https://bugzilla.redhat.com/show_bug.cgi?id=1077897

https://bugzilla.redhat.com/show_bug.cgi?id=1079099

https://bugzilla.redhat.com/show_bug.cgi?id=1080186

https://bugzilla.redhat.com/show_bug.cgi?id=1082967

https://bugzilla.redhat.com/show_bug.cgi?id=1086890

https://bugzilla.redhat.com/show_bug.cgi?id=1086902

https://bugzilla.redhat.com/show_bug.cgi?id=1086904

https://bugzilla.redhat.com/show_bug.cgi?id=1086908

https://bugzilla.redhat.com/show_bug.cgi?id=1090178

https://bugzilla.redhat.com/show_bug.cgi?id=1092099

https://bugzilla.redhat.com/show_bug.cgi?id=1092342

https://bugzilla.redhat.com/show_bug.cgi?id=1092648

https://bugzilla.redhat.com/show_bug.cgi?id=1097004

https://bugzilla.redhat.com/show_bug.cgi?id=1098654

https://bugzilla.redhat.com/show_bug.cgi?id=1099654

https://bugzilla.redhat.com/show_bug.cgi?id=1108298

https://bugzilla.redhat.com/show_bug.cgi?id=1108405

https://bugzilla.redhat.com/show_bug.cgi?id=1108407

https://bugzilla.redhat.com/show_bug.cgi?id=1108872

https://bugzilla.redhat.com/show_bug.cgi?id=1108874

https://bugzilla.redhat.com/show_bug.cgi?id=1108881

https://bugzilla.redhat.com/show_bug.cgi?id=1108895

https://bugzilla.redhat.com/show_bug.cgi?id=1108902

https://bugzilla.redhat.com/show_bug.cgi?id=1108909

https://bugzilla.redhat.com/show_bug.cgi?id=1109334

https://bugzilla.redhat.com/show_bug.cgi?id=1109336

https://bugzilla.redhat.com/show_bug.cgi?id=1109339

https://bugzilla.redhat.com/show_bug.cgi?id=1109354

https://bugzilla.redhat.com/show_bug.cgi?id=1109357

https://bugzilla.redhat.com/show_bug.cgi?id=1109364

https://bugzilla.redhat.com/show_bug.cgi?id=1109375

https://bugzilla.redhat.com/show_bug.cgi?id=1109378

https://bugzilla.redhat.com/show_bug.cgi?id=1111364

https://bugzilla.redhat.com/show_bug.cgi?id=1112824

https://bugzilla.redhat.com/show_bug.cgi?id=1113605

https://bugzilla.redhat.com/show_bug.cgi?id=1115177

https://bugzilla.redhat.com/show_bug.cgi?id=1117021

https://bugzilla.redhat.com/show_bug.cgi?id=1117975

https://bugzilla.redhat.com/show_bug.cgi?id=1117979

https://bugzilla.redhat.com/show_bug.cgi?id=1117981

https://bugzilla.redhat.com/show_bug.cgi?id=1117982

https://bugzilla.redhat.com/show_bug.cgi?id=1118002

https://bugzilla.redhat.com/show_bug.cgi?id=1118006

https://bugzilla.redhat.com/show_bug.cgi?id=1118007

https://bugzilla.redhat.com/show_bug.cgi?id=1118014

https://bugzilla.redhat.com/show_bug.cgi?id=1118021

https://bugzilla.redhat.com/show_bug.cgi?id=1118032

https://bugzilla.redhat.com/show_bug.cgi?id=1118043

https://bugzilla.redhat.com/show_bug.cgi?id=1118048

https://bugzilla.redhat.com/show_bug.cgi?id=1118051

https://bugzilla.redhat.com/show_bug.cgi?id=1118054

https://bugzilla.redhat.com/show_bug.cgi?id=1118055

https://bugzilla.redhat.com/show_bug.cgi?id=1118057

https://bugzilla.redhat.com/show_bug.cgi?id=1118059

https://bugzilla.redhat.com/show_bug.cgi?id=1118060

https://bugzilla.redhat.com/show_bug.cgi?id=1118066

https://bugzilla.redhat.com/show_bug.cgi?id=1118069

https://bugzilla.redhat.com/show_bug.cgi?id=1118074

https://bugzilla.redhat.com/show_bug.cgi?id=1118076

https://bugzilla.redhat.com/show_bug.cgi?id=1118077

https://bugzilla.redhat.com/show_bug.cgi?id=1118079

https://bugzilla.redhat.com/show_bug.cgi?id=1118080

https://bugzilla.redhat.com/show_bug.cgi?id=1118081

https://bugzilla.redhat.com/show_bug.cgi?id=1118082

https://bugzilla.redhat.com/show_bug.cgi?id=1139882

https://bugzilla.redhat.com/show_bug.cgi?id=1140888

https://bugzilla.redhat.com/show_bug.cgi?id=1145846

https://bugzilla.redhat.com/show_bug.cgi?id=1150206

https://bugzilla.redhat.com/show_bug.cgi?id=1150694

https://bugzilla.redhat.com/show_bug.cgi?id=1150695

https://bugzilla.redhat.com/show_bug.cgi?id=1151287

https://bugzilla.redhat.com/show_bug.cgi?id=1153737

https://bugzilla.redhat.com/show_bug.cgi?id=1156607

https://bugzilla.redhat.com/show_bug.cgi?id=1162997

https://bugzilla.redhat.com/show_bug.cgi?id=1163461

https://bugzilla.redhat.com/show_bug.cgi?id=1166252

https://bugzilla.redhat.com/show_bug.cgi?id=1166260

https://bugzilla.redhat.com/show_bug.cgi?id=1167858

https://bugzilla.redhat.com/show_bug.cgi?id=1170707

https://bugzilla.redhat.com/show_bug.cgi?id=1170708

https://bugzilla.redhat.com/show_bug.cgi?id=1170709

https://bugzilla.redhat.com/show_bug.cgi?id=1171355

https://bugzilla.redhat.com/show_bug.cgi?id=1171356

https://bugzilla.redhat.com/show_bug.cgi?id=1172597

https://bugzilla.redhat.com/show_bug.cgi?id=1172729

https://bugzilla.redhat.com/show_bug.cgi?id=1173273

https://bugzilla.redhat.com/show_bug.cgi?id=1180325

https://bugzilla.redhat.com/show_bug.cgi?id=1182477

https://bugzilla.redhat.com/show_bug.cgi?id=1183655

https://bugzilla.redhat.com/show_bug.cgi?id=881372

https://bugzilla.redhat.com/show_bug.cgi?id=920597

https://bugzilla.redhat.com/show_bug.cgi?id=921162

https://bugzilla.redhat.com/show_bug.cgi?id=923799

https://bugzilla.redhat.com/show_bug.cgi?id=924937

https://bugzilla.redhat.com/show_bug.cgi?id=951754

https://bugzilla.redhat.com/show_bug.cgi?id=975176

https://bugzilla.redhat.com/show_bug.cgi?id=982597

https://bugzilla.redhat.com/show_bug.cgi?id=994690

Plugin Details

Severity: Medium

ID: 81634

File Name: redhat-RHSA-2015-0416.nasl

Version: 1.13

Type: local

Agent: unix

Published: 3/5/2015

Updated: 3/20/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.7

Vendor

Vendor Severity: Important

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2014-8105

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2014-8112

Vulnerability Information

CPE: cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:389-ds-base-libs, p-cpe:/a:redhat:enterprise_linux:389-ds-base, p-cpe:/a:redhat:enterprise_linux:389-ds-base-devel

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 3/5/2015

Vulnerability Publication Date: 3/10/2015

Reference Information

CVE: CVE-2014-8105, CVE-2014-8112

BID: 72985, 73033

CWE: 200, 522

RHSA: 2015:0416