A denial of service vulnerability was found in 389-ds-base ldap server. This issue may allow an authenticated user to cause a server crash or hang while authenticating with an user having a malformed userPassword. By default only the administrator may directly add hashed password that can trigger the issue. But if nsslapd-allow-hashed-passwords config parameter is turned on, any user can trigger the issue. The problem is triggered by adding a password to an user using the hashed format (with a hash value too long for the specified hash scheme) Then later on when trying to authenticate on that user its triggers the buffer overflow By default, only administrators are allowed to add hashed passwords but there is a configuration parameter (nsslapd-allow-hashed-passwords) allowing any users to add hashed passwords and potentially trigger the DoS. This vulnerability affects versions: >= 1.3.7.2
Created 389-ds-base tracking bugs for this issue: Affects: fedora-all [bug 2292109]
Hi Patrick, Can you create a clone of this ticket for a directory_server_12.4 z stream build. Thank you
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:4633 https://access.redhat.com/errata/RHSA-2024:4633
This issue has been addressed in the following products: Red Hat Directory Server 12.4 for RHEL 9 Via RHSA-2024:4997 https://access.redhat.com/errata/RHSA-2024:4997
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:5192 https://access.redhat.com/errata/RHSA-2024:5192
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2024:5690 https://access.redhat.com/errata/RHSA-2024:5690
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Extended Lifecycle Support Via RHSA-2024:6153 https://access.redhat.com/errata/RHSA-2024:6153
This issue has been addressed in the following products: Red Hat Directory Server 11.9 for RHEL 8 Via RHSA-2024:6568 https://access.redhat.com/errata/RHSA-2024:6568
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:6569 https://access.redhat.com/errata/RHSA-2024:6569
This issue has been addressed in the following products: Red Hat Directory Server 11.7 for RHEL 8 Via RHSA-2024:6576 https://access.redhat.com/errata/RHSA-2024:6576