Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1347760 - (CVE-2016-4992) CVE-2016-4992 389-ds-base: Information disclosure via repeated use of LDAP ADD operation
CVE-2016-4992 389-ds-base: Information disclosure via repeated use of LDAP AD...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20160617,reported=2...
: Security
Depends On: 1347761 1347763 1350799 1358559 1358560 1358561
Blocks: 1323912 1347766
  Show dependency treegraph
 
Reported: 2016-06-17 10:53 EDT by Adam Mariš
Modified: 2016-11-15 14:56 EST (History)
8 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
An information disclosure flaw was found in 389 Directory Server. A user with no access to objects in certain LDAP sub-tree could send LDAP ADD operations with a specific object name. The error message returned to the user was different based on whether the target object existed or not.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-11-15 14:56:53 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2016:2594 normal SHIPPED_LIVE Moderate: 389-ds-base security, bug fix, and enhancement update 2016-11-03 08:11:08 EDT
Red Hat Product Errata RHSA-2016:2765 normal SHIPPED_LIVE Moderate: 389-ds-base security, bug fix, and enhancement update 2016-11-15 19:36:28 EST

  None (edit)
Description Adam Mariš 2016-06-17 10:53:47 EDT
A vulnerability in 389-ds-base was found that allows to bypass limitations for compare and read operations specified by Access Control Instructions.

When having LDAP sub-tree with some existing objects and having BIND DN which have no privileges over objects inside the sub-tree, unprivileged user can send LDAP ADD operation specifying an object in (supposedly) inaccessible sub-tree. The returned error messages discloses the information when the queried object exists having the specified value. Attacker can use this flaw to guess values of RDN component by repeating the above process.
Comment 1 Adam Mariš 2016-06-17 10:53:58 EDT
Acknowledgments:

Name: Petr Spacek (Red Hat), Martin Basti (Red Hat)
Comment 2 Adam Mariš 2016-06-17 10:54:25 EDT
Created 389-ds-base tracking bugs for this issue:

Affects: fedora-all [bug 1347761]
Affects: epel-5 [bug 1347763]
Comment 6 Noriko Hosoi 2016-06-20 20:23 EDT
Created attachment 1170018 [details]
git patch file (master) -- solves ADD case
Comment 13 Petr Spacek 2016-06-21 04:05:03 EDT
(In reply to Adam Mariš from comment #1)
> Acknowledgments:
> 
> Name: Petr Spacek (Red Hat)

Hi,

please add Martin Basti (Red Hat) to Acknowledgments, he was working on the code with me and we have spotted the problem together.
Comment 14 Adam Mariš 2016-06-21 04:40:57 EDT
> > Acknowledgments:
> > 
> > Name: Petr Spacek (Red Hat)
> 
> Hi,
> 
> please add Martin Basti (Red Hat) to Acknowledgments, he was working on the
> code with me and we have spotted the problem together.

Done!

---
didn't mean to remove the other needinfo, setting it back
Comment 20 Petr Spacek 2016-07-21 03:31:38 EDT
The description should be extended to BIND operation as well.
Comment 28 errata-xmlrpc 2016-11-03 16:42:57 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2016:2594 https://rhn.redhat.com/errata/RHSA-2016-2594.html
Comment 30 errata-xmlrpc 2016-11-15 14:37:24 EST
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2016:2765 https://rhn.redhat.com/errata/RHSA-2016-2765.html

Note You need to log in before you can comment on or make changes to this bug.