Bug 1123477 (CVE-2014-3562)

Summary: CVE-2014-3562 389-ds: unauthenticated information disclosure
Product: [Other] Security Response Reporter: Vincent Danen <vdanen>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: jgalipea, jrusnack, lkrispen, mkosek, nhosoi, nkinder, rmeggins, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
It was found that when replication was enabled for each attribute in Red Hat Directory Server / 389 Directory Server, which is the default configuration, the server returned replicated metadata when the directory was searched while debugging was enabled. A remote attacker could use this flaw to disclose potentially sensitive information.
Story Points: ---
Clone Of: Environment:
Last Closed: 2014-08-07 18:44:12 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1123861, 1123863, 1123864, 1123865, 1123866, 1127833, 1127834    
Bug Blocks: 1123480    
Attachments:
Description Flags
patch to correct the flaw
rmeggins: review+
schema and aci change for workaround
none
Updated the Ludwig's patch following the review comments by Rich. none

Description Vincent Danen 2014-07-25 19:22:29 UTC
IssueDescription:

It was found that when replication was enabled for each attribute in Red Hat Directory Server / 389 Directory Server, which is the default configuration, the server returned replicated metadata when the directory was searched while debugging was enabled. A remote attacker could use this flaw to disclose potentially sensitive information.


Acknowledgements:

This issue was discovered by Ludwig Krispenz of Red Hat.

Comment 1 Vincent Danen 2014-07-25 19:23:51 UTC
Created attachment 921040 [details]
patch to correct the flaw

Comment 2 Rich Megginson 2014-07-25 19:52:01 UTC
Comment on attachment 921040 [details]
patch to correct the flaw

It would be better if the new int rootonly structure member were added at the end.  This is a private structure, but just to be safe to ensure ABI compatibility.

Otherwise, ack

Comment 4 Nathan Kinder 2014-07-25 20:09:55 UTC
Adding mkosek since this affects IPA/IdM.

Comment 5 Ludwig 2014-07-28 07:31:10 UTC
Created attachment 921712 [details]
schema and aci change for workaround

Comment 6 Ludwig 2014-07-28 07:32:14 UTC
adding an nscpenntrywss attributetypes to the schema makes the aci work

Comment 7 Martin Kosek 2014-07-28 07:37:29 UTC
JFTR, this issue should not affect FreeIPA 4.0 and later as we no longer allow all attributes (except defined blacklist) as we did in pre-4.0, but rather only allow specified attributes (feature page: http://www.freeipa.org/page/V4/Permissions_V2).

Comment 11 Noriko Hosoi 2014-07-28 16:49:32 UTC
Created attachment 921835 [details]
Updated the Ludwig's patch following the review comments by Rich.

Comment 12 Noriko Hosoi 2014-07-29 00:41:15 UTC
Steps to verify:
1. set up 2-way MMR
2. do some add/modify/delete
3. run search as Directory Manager with attribute list "nscpEntryWSI".
ldapsearch [...] -D "cn=directory manager" -w <pw> -b <suffix> nscpEntryWSI
Expected result:
   dn: <some rdn>,<suffix>
   nscpEntryWSI: dn: <some rdn>,<suffix>
   nscpEntryWSI: objectClass;vucsn-53d6ebef000000010000: organization
   nscpEntryWSI: objectClass;vucsn-53d6ebef000000010000: top
   [...]
   nscpEntryWSI: tombstoneNumSubordinates: 1
4. run search as an ordinary user with attribute list "nscpEntryWSI".
ldapsearch [...] -D "uid=testuser,<suffix>" -w <pw> -b <suffix> nscpEntryWSI
Expected result:
   dn: <some rdn>,<suffix>
5. run search as nobody with attribute list "nscpEntryWSI".
ldapsearch [...] -b <suffix> nscpEntryWSI
Expected result:
   dn: <some rdn>,<suffix>

If only searching as the Directory Manager returns nscpEntryWSI values, this bug is verified.

Comment 13 Vincent Danen 2014-08-07 16:06:38 UTC
Created 389-ds-base tracking bugs for this issue:

Affects: fedora-all [bug 1127833]
Affects: epel-5 [bug 1127834]

Comment 14 errata-xmlrpc 2014-08-07 16:42:20 UTC
This issue has been addressed in following products:

  Red Hat Directory Server 8 for RHEL 5

Via RHSA-2014:1032 https://rhn.redhat.com/errata/RHSA-2014-1032.html

Comment 15 errata-xmlrpc 2014-08-07 18:24:01 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 7
  Red Hat Enterprise Linux 6

Via RHSA-2014:1031 https://rhn.redhat.com/errata/RHSA-2014-1031.html