Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1123477 - (CVE-2014-3562) CVE-2014-3562 389-ds: unauthenticated information disclosure
CVE-2014-3562 389-ds: unauthenticated information disclosure
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
impact=important,public=20140807,repo...
: Security
Depends On: 1123861 1123863 1123864 1123865 1123866 1127833 1127834
Blocks: 1123480
  Show dependency treegraph
 
Reported: 2014-07-25 15:22 EDT by Vincent Danen
Modified: 2015-08-19 04:35 EDT (History)
8 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
It was found that when replication was enabled for each attribute in Red Hat Directory Server / 389 Directory Server, which is the default configuration, the server returned replicated metadata when the directory was searched while debugging was enabled. A remote attacker could use this flaw to disclose potentially sensitive information.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2014-08-07 14:44:12 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
patch to correct the flaw (3.72 KB, patch)
2014-07-25 15:23 EDT, Vincent Danen
rmeggins: review+
Details | Diff
schema and aci change for workaround (370 bytes, text/x-ldif)
2014-07-28 03:31 EDT, Ludwig
no flags Details
Updated the Ludwig's patch following the review comments by Rich. (3.97 KB, patch)
2014-07-28 12:49 EDT, Noriko Hosoi
no flags Details | Diff


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:1031 normal SHIPPED_LIVE Important: 389-ds-base security update 2014-08-07 18:23:38 EDT
Red Hat Product Errata RHSA-2014:1032 normal SHIPPED_LIVE Important: redhat-ds-base security update 2014-08-07 16:42:11 EDT

  None (edit)
Description Vincent Danen 2014-07-25 15:22:29 EDT
IssueDescription:

It was found that when replication was enabled for each attribute in Red Hat Directory Server / 389 Directory Server, which is the default configuration, the server returned replicated metadata when the directory was searched while debugging was enabled. A remote attacker could use this flaw to disclose potentially sensitive information.


Acknowledgements:

This issue was discovered by Ludwig Krispenz of Red Hat.
Comment 1 Vincent Danen 2014-07-25 15:23:51 EDT
Created attachment 921040 [details]
patch to correct the flaw
Comment 2 Rich Megginson 2014-07-25 15:52:01 EDT
Comment on attachment 921040 [details]
patch to correct the flaw

It would be better if the new int rootonly structure member were added at the end.  This is a private structure, but just to be safe to ensure ABI compatibility.

Otherwise, ack
Comment 4 Nathan Kinder 2014-07-25 16:09:55 EDT
Adding mkosek since this affects IPA/IdM.
Comment 5 Ludwig 2014-07-28 03:31:10 EDT
Created attachment 921712 [details]
schema and aci change for workaround
Comment 6 Ludwig 2014-07-28 03:32:14 EDT
adding an nscpenntrywss attributetypes to the schema makes the aci work
Comment 7 Martin Kosek 2014-07-28 03:37:29 EDT
JFTR, this issue should not affect FreeIPA 4.0 and later as we no longer allow all attributes (except defined blacklist) as we did in pre-4.0, but rather only allow specified attributes (feature page: http://www.freeipa.org/page/V4/Permissions_V2).
Comment 11 Noriko Hosoi 2014-07-28 12:49:32 EDT
Created attachment 921835 [details]
Updated the Ludwig's patch following the review comments by Rich.
Comment 12 Noriko Hosoi 2014-07-28 20:41:15 EDT
Steps to verify:
1. set up 2-way MMR
2. do some add/modify/delete
3. run search as Directory Manager with attribute list "nscpEntryWSI".
ldapsearch [...] -D "cn=directory manager" -w <pw> -b <suffix> nscpEntryWSI
Expected result:
   dn: <some rdn>,<suffix>
   nscpEntryWSI: dn: <some rdn>,<suffix>
   nscpEntryWSI: objectClass;vucsn-53d6ebef000000010000: organization
   nscpEntryWSI: objectClass;vucsn-53d6ebef000000010000: top
   [...]
   nscpEntryWSI: tombstoneNumSubordinates: 1
4. run search as an ordinary user with attribute list "nscpEntryWSI".
ldapsearch [...] -D "uid=testuser,<suffix>" -w <pw> -b <suffix> nscpEntryWSI
Expected result:
   dn: <some rdn>,<suffix>
5. run search as nobody with attribute list "nscpEntryWSI".
ldapsearch [...] -b <suffix> nscpEntryWSI
Expected result:
   dn: <some rdn>,<suffix>

If only searching as the Directory Manager returns nscpEntryWSI values, this bug is verified.
Comment 13 Vincent Danen 2014-08-07 12:06:38 EDT
Created 389-ds-base tracking bugs for this issue:

Affects: fedora-all [bug 1127833]
Affects: epel-5 [bug 1127834]
Comment 14 errata-xmlrpc 2014-08-07 12:42:20 EDT
This issue has been addressed in following products:

  Red Hat Directory Server 8 for RHEL 5

Via RHSA-2014:1032 https://rhn.redhat.com/errata/RHSA-2014-1032.html
Comment 15 errata-xmlrpc 2014-08-07 14:24:01 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 7
  Red Hat Enterprise Linux 6

Via RHSA-2014:1031 https://rhn.redhat.com/errata/RHSA-2014-1031.html

Note You need to log in before you can comment on or make changes to this bug.