Amazon Linux AMI : 389-ds-base (ALAS-2015-501)

medium Nessus Plugin ID 82508

Synopsis

The remote Amazon Linux AMI host is missing a security update.

Description

An information disclosure flaw was found in the way the 389 Directory Server stored information in the Changelog that is exposed via the 'cn=changelog' LDAP sub-tree. An unauthenticated user could in certain cases use this flaw to read data from the Changelog, which could include sensitive information such as plain-text passwords.
(CVE-2014-8105)

It was found that when the nsslapd-unhashed-pw-switch 389 Directory Server configuration option was set to 'off', it did not prevent the writing of unhashed passwords into the Changelog. This could potentially allow an authenticated user able to access the Changelog to read sensitive information. (CVE-2014-8112)

Solution

Run 'yum update 389-ds-base' to update your system.

See Also

https://alas.aws.amazon.com/ALAS-2015-501.html

Plugin Details

Severity: Medium

ID: 82508

File Name: ala_ALAS-2015-501.nasl

Version: 1.2

Type: local

Agent: unix

Published: 4/2/2015

Updated: 4/18/2018

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.7

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:389-ds-base-debuginfo, p-cpe:/a:amazon:linux:389-ds-base, cpe:/o:amazon:linux, p-cpe:/a:amazon:linux:389-ds-base-libs, p-cpe:/a:amazon:linux:389-ds-base-devel

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Patch Publication Date: 4/1/2015

Reference Information

CVE: CVE-2014-8105, CVE-2014-8112

ALAS: 2015-501