SB2020011623 - Amazon Linux AMI update for 389-ds-base



SB2020011623 - Amazon Linux AMI update for 389-ds-base

Published: January 16, 2020

Security Bulletin ID SB2020011623
Severity
Low
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Cleartext storage of sensitive information (CVE-ID: CVE-2018-10871)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists when the Replica and/or retroChangeLog plugins are enabled. A local user can gain access to sensitive information stored in the log files in plain text.


2) Information disclosure (CVE-ID: CVE-2019-10224)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists within the dscreate and dsconf commands in 389-ds-base due to excessive data output, when executed in verbose mode. A local user can gain access to sensitive information, such as the Directory Manager password.

Successful exploitation of the vulnerability requires that the attacker can see the screen or record terminal session.


3) Information disclosure (CVE-ID: CVE-2019-14824)

The vulnerability allows a remote user to gain access to potentially sensitive information.

The vulnerability exists due to incorrect permissions in the 'deref' plugin in 389-ds-base when displaying attribute values during search. A remote user in local network can gain access to private attributes, such as password hashes.


4) Resource management error (CVE-ID: CVE-2019-3883)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect processing of tome outs for SSL/TLS connections. A remote authenticated user initiate a large number of SSL/TLS connections and consume all available workers, which will lead to a denial of service attack. 




Remediation

Install update from vendor's website.