SB2019092405 - OpenSUSE Linux update for openldap2 



SB2019092405 - OpenSUSE Linux update for openldap2

Published: September 24, 2019

Security Bulletin ID SB2019092405
Severity
Low
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Stack-based buffer overflow (CVE-ID: CVE-2017-17740)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The vulnerability exists due to a boundary error шт contrib/slapd-modules/nops/nops.c when both the nops module and the memberof overlay are enabled. A remote unauthenticated attacker can trigger stack-based buffer overflow and cause slapd crash via a member MODDN operation.

2) Improper Authorization (CVE-ID: CVE-2019-13057)

The vulnerability allows a remote attacker to escalate privileges on the system.

The vulnerability exists due to incorrect processing of rootDN delegation in the OpenLDAP multi-tenant deployments. A database administrator could use this issue to request authorization as an identity from another database, contrary to expectations.


3) Improper Authorization (CVE-ID: CVE-2019-13565)

The vulnerability allows a remote attacker to escalate privileges.
The vulnerability exists due to incorrect processing of SASL authentication and session encryption in OpenLDAP. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections, allowing to bypass ACLs and obtain access by performing simple binds.

Remediation

Install update from vendor's website.