Bug 1381481 (CVE-2017-2591)
Summary: | CVE-2017-2591 389-ds-base: Heap buffer overflow in uiduniq.c | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Adam Mariš <amaris> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | amaris, cbuissar, edewata, fweimer, mreynolds, nhosoi, nkinder, rmeggins |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | 389-ds-base 1.3.6 | Doc Type: | If docs needed, set a value |
Doc Text: |
It was found that the uniqueness_entry_to_config() function, used by the "attribute uniqueness" plugin of 389 Directory Server, did not properly NULL terminate an array used in some configuration. An authenticated, or possibly unauthenticated, attacker could use this flaw to force an out-of-bound heap memory read, possibly triggering a crash of the LDAP service.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2017-01-19 10:59:15 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1381483 | ||
Bug Blocks: | 1381482 |
Description
Adam Mariš
2016-10-04 08:58:22 UTC
Created 389-ds-base tracking bugs for this issue: Affects: fedora-all [bug 1381483] Fixed in 389-ds-base-1.3.6 and newer. Note: 389-ds-base-1.3.6 is available for F26 (current rawhide). Statement: Red Hat Product Security has rated this issue as having Low security impact, a future update may address this flaw. |