Bug 1381481 (CVE-2017-2591) - CVE-2017-2591 389-ds-base: Heap buffer overflow in uiduniq.c
Summary: CVE-2017-2591 389-ds-base: Heap buffer overflow in uiduniq.c
Alias: CVE-2017-2591
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1381483
Blocks: 1381482
TreeView+ depends on / blocked
Reported: 2016-10-04 08:58 UTC by Adam Mariš
Modified: 2021-02-17 03:14 UTC (History)
8 users (show)

Fixed In Version: 389-ds-base 1.3.6
Doc Type: If docs needed, set a value
Doc Text:
It was found that the uniqueness_entry_to_config() function, used by the "attribute uniqueness" plugin of 389 Directory Server, did not properly NULL terminate an array used in some configuration. An authenticated, or possibly unauthenticated, attacker could use this flaw to force an out-of-bound heap memory read, possibly triggering a crash of the LDAP service.
Clone Of:
Last Closed: 2017-01-19 10:59:15 UTC

Attachments (Terms of Use)

Description Adam Mariš 2016-10-04 08:58:22 UTC
The "attribute uniqueness" plugin did not properly NULL-terminate an array when building up its configuration, if a so called 'old-style' configuration, was being used (Using nsslapd-pluginarg<X> parameters) .

A attacker, authenticated, but possibly also unauthenticated, could possibly force the plugin to read beyond allocated memory and trigger a segfault.

The crash could also possibly be triggered accidentally.

Upstream patch :https://fedorahosted.org/389/changeset/ffda694dd622b31277da07be76d3469fad86150f/
Affected versions : from

Fixed version : 1.3.6

Upstream bug report : https://fedorahosted.org/389/ticket/48986

Comment 1 Adam Mariš 2016-10-04 09:01:26 UTC
Created 389-ds-base tracking bugs for this issue:

Affects: fedora-all [bug 1381483]

Comment 2 Noriko Hosoi 2016-11-14 22:07:51 UTC
Fixed in 389-ds-base-1.3.6 and newer.

Note: 389-ds-base-1.3.6 is available for F26 (current rawhide).

Comment 9 Cedric Buissart 2017-01-19 10:56:20 UTC

Red Hat Product Security has rated this issue as having Low security
impact, a future update may address this flaw.

Note You need to log in before you can comment on or make changes to this bug.