Amazon Linux AMI update for openldap



Risk Medium
Patch available YES
Number of vulnerabilities 12
CVE-ID CVE-2019-13565
CVE-2020-36221
CVE-2020-36222
CVE-2020-36223
CVE-2020-36224
CVE-2020-36225
CVE-2020-36226
CVE-2020-36227
CVE-2020-36228
CVE-2020-36229
CVE-2020-36230
CVE-2021-27212
CWE-ID CWE-285
CWE-191
CWE-617
CWE-415
CWE-763
CWE-399
CWE-835
CWE-843
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Amazon Linux AMI
Operating systems & Components / Operating system

openldap
Operating systems & Components / Operating system package or component

Vendor Amazon Web Services

Security Bulletin

This security bulletin contains information about 12 vulnerabilities.

1) Improper Authorization

EUVDB-ID: #VU19562

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-13565

CWE-ID: CWE-285 - Improper Authorization

Exploit availability: No

Description

The vulnerability allows a remote attacker to escalate privileges.
The vulnerability exists due to incorrect processing of SASL authentication and session encryption in OpenLDAP. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections, allowing to bypass ACLs and obtain access by performing simple binds.

Mitigation

Update the affected packages:

i686:
    openldap-clients-2.4.40-16.36.amzn1.i686
    openldap-servers-2.4.40-16.36.amzn1.i686
    openldap-devel-2.4.40-16.36.amzn1.i686
    openldap-2.4.40-16.36.amzn1.i686
    openldap-debuginfo-2.4.40-16.36.amzn1.i686
    openldap-servers-sql-2.4.40-16.36.amzn1.i686

src:
    openldap-2.4.40-16.36.amzn1.src

x86_64:
    openldap-2.4.40-16.36.amzn1.x86_64
    openldap-servers-2.4.40-16.36.amzn1.x86_64
    openldap-devel-2.4.40-16.36.amzn1.x86_64
    openldap-debuginfo-2.4.40-16.36.amzn1.x86_64
    openldap-servers-sql-2.4.40-16.36.amzn1.x86_64
    openldap-clients-2.4.40-16.36.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

openldap: before 2.4.40-16.36

CPE2.3 External links

http://alas.aws.amazon.com/ALAS-2023-1741.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Integer underflow

EUVDB-ID: #VU50389

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-36221

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to integer underflow within the serialNumberAndIssuerCheck() function in schema_init.c. A remote attacker can send a specially crafted request to the affected application, trigger an integer underflow and crash the slapd.


Mitigation

Update the affected packages:

i686:
    openldap-clients-2.4.40-16.36.amzn1.i686
    openldap-servers-2.4.40-16.36.amzn1.i686
    openldap-devel-2.4.40-16.36.amzn1.i686
    openldap-2.4.40-16.36.amzn1.i686
    openldap-debuginfo-2.4.40-16.36.amzn1.i686
    openldap-servers-sql-2.4.40-16.36.amzn1.i686

src:
    openldap-2.4.40-16.36.amzn1.src

x86_64:
    openldap-2.4.40-16.36.amzn1.x86_64
    openldap-servers-2.4.40-16.36.amzn1.x86_64
    openldap-devel-2.4.40-16.36.amzn1.x86_64
    openldap-debuginfo-2.4.40-16.36.amzn1.x86_64
    openldap-servers-sql-2.4.40-16.36.amzn1.x86_64
    openldap-clients-2.4.40-16.36.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

openldap: before 2.4.40-16.36

CPE2.3 External links

http://alas.aws.amazon.com/ALAS-2023-1741.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Reachable Assertion

EUVDB-ID: #VU50390

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-36222

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion in slapd in the saslAuthzTo validation. A remote attacker can send a specially crafted request and perform a denial of service (DoS) attack.

Mitigation

Update the affected packages:

i686:
    openldap-clients-2.4.40-16.36.amzn1.i686
    openldap-servers-2.4.40-16.36.amzn1.i686
    openldap-devel-2.4.40-16.36.amzn1.i686
    openldap-2.4.40-16.36.amzn1.i686
    openldap-debuginfo-2.4.40-16.36.amzn1.i686
    openldap-servers-sql-2.4.40-16.36.amzn1.i686

src:
    openldap-2.4.40-16.36.amzn1.src

x86_64:
    openldap-2.4.40-16.36.amzn1.x86_64
    openldap-servers-2.4.40-16.36.amzn1.x86_64
    openldap-devel-2.4.40-16.36.amzn1.x86_64
    openldap-debuginfo-2.4.40-16.36.amzn1.x86_64
    openldap-servers-sql-2.4.40-16.36.amzn1.x86_64
    openldap-clients-2.4.40-16.36.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

openldap: before 2.4.40-16.36

CPE2.3 External links

http://alas.aws.amazon.com/ALAS-2023-1741.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Double Free

EUVDB-ID: #VU50391

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-36223

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error during the Values Return Filter control handling. A remote attacker can send a specially crafted request to the slapd, trigger a double free error and perform a denial of service (DoS) attack.

Mitigation

Update the affected packages:

i686:
    openldap-clients-2.4.40-16.36.amzn1.i686
    openldap-servers-2.4.40-16.36.amzn1.i686
    openldap-devel-2.4.40-16.36.amzn1.i686
    openldap-2.4.40-16.36.amzn1.i686
    openldap-debuginfo-2.4.40-16.36.amzn1.i686
    openldap-servers-sql-2.4.40-16.36.amzn1.i686

src:
    openldap-2.4.40-16.36.amzn1.src

x86_64:
    openldap-2.4.40-16.36.amzn1.x86_64
    openldap-servers-2.4.40-16.36.amzn1.x86_64
    openldap-devel-2.4.40-16.36.amzn1.x86_64
    openldap-debuginfo-2.4.40-16.36.amzn1.x86_64
    openldap-servers-sql-2.4.40-16.36.amzn1.x86_64
    openldap-clients-2.4.40-16.36.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

openldap: before 2.4.40-16.36

CPE2.3 External links

http://alas.aws.amazon.com/ALAS-2023-1741.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Release of invalid pointer or reference

EUVDB-ID: #VU50398

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-36224

CWE-ID: CWE-763 - Release of invalid pointer or reference

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to release of an invalid pointer when processing saslAuthzTo requests. A remote attacker can send a specially crafted request to slapd and perform a denial of service (DoS) attack.

Mitigation

Update the affected packages:

i686:
    openldap-clients-2.4.40-16.36.amzn1.i686
    openldap-servers-2.4.40-16.36.amzn1.i686
    openldap-devel-2.4.40-16.36.amzn1.i686
    openldap-2.4.40-16.36.amzn1.i686
    openldap-debuginfo-2.4.40-16.36.amzn1.i686
    openldap-servers-sql-2.4.40-16.36.amzn1.i686

src:
    openldap-2.4.40-16.36.amzn1.src

x86_64:
    openldap-2.4.40-16.36.amzn1.x86_64
    openldap-servers-2.4.40-16.36.amzn1.x86_64
    openldap-devel-2.4.40-16.36.amzn1.x86_64
    openldap-debuginfo-2.4.40-16.36.amzn1.x86_64
    openldap-servers-sql-2.4.40-16.36.amzn1.x86_64
    openldap-clients-2.4.40-16.36.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

openldap: before 2.4.40-16.36

CPE2.3 External links

http://alas.aws.amazon.com/ALAS-2023-1741.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Double Free

EUVDB-ID: #VU50392

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-36225

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in the saslAuthzTo processing. A remote attacker can send a specially crafted request to the slapd, trigger a double free error and perform a denial of service (DoS) attack

Mitigation

Update the affected packages:

i686:
    openldap-clients-2.4.40-16.36.amzn1.i686
    openldap-servers-2.4.40-16.36.amzn1.i686
    openldap-devel-2.4.40-16.36.amzn1.i686
    openldap-2.4.40-16.36.amzn1.i686
    openldap-debuginfo-2.4.40-16.36.amzn1.i686
    openldap-servers-sql-2.4.40-16.36.amzn1.i686

src:
    openldap-2.4.40-16.36.amzn1.src

x86_64:
    openldap-2.4.40-16.36.amzn1.x86_64
    openldap-servers-2.4.40-16.36.amzn1.x86_64
    openldap-devel-2.4.40-16.36.amzn1.x86_64
    openldap-debuginfo-2.4.40-16.36.amzn1.x86_64
    openldap-servers-sql-2.4.40-16.36.amzn1.x86_64
    openldap-clients-2.4.40-16.36.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

openldap: before 2.4.40-16.36

CPE2.3 External links

http://alas.aws.amazon.com/ALAS-2023-1741.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Resource management error

EUVDB-ID: #VU50393

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-36226

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources within the application leading to a memch->bv_len miscalculation during saslAuthzTo processing. A remote attacker can send specially crafted request to the slapd and perform a denial of service (DoS) attack.

Mitigation

Update the affected packages:

i686:
    openldap-clients-2.4.40-16.36.amzn1.i686
    openldap-servers-2.4.40-16.36.amzn1.i686
    openldap-devel-2.4.40-16.36.amzn1.i686
    openldap-2.4.40-16.36.amzn1.i686
    openldap-debuginfo-2.4.40-16.36.amzn1.i686
    openldap-servers-sql-2.4.40-16.36.amzn1.i686

src:
    openldap-2.4.40-16.36.amzn1.src

x86_64:
    openldap-2.4.40-16.36.amzn1.x86_64
    openldap-servers-2.4.40-16.36.amzn1.x86_64
    openldap-devel-2.4.40-16.36.amzn1.x86_64
    openldap-debuginfo-2.4.40-16.36.amzn1.x86_64
    openldap-servers-sql-2.4.40-16.36.amzn1.x86_64
    openldap-clients-2.4.40-16.36.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

openldap: before 2.4.40-16.36

CPE2.3 External links

http://alas.aws.amazon.com/ALAS-2023-1741.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Infinite loop

EUVDB-ID: #VU50394

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-36227

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop in slapd with the cancel_extop Cancel operation. A remote attacker can send a specially crafted request and perform a denial of service conditions.

Mitigation

Update the affected packages:

i686:
    openldap-clients-2.4.40-16.36.amzn1.i686
    openldap-servers-2.4.40-16.36.amzn1.i686
    openldap-devel-2.4.40-16.36.amzn1.i686
    openldap-2.4.40-16.36.amzn1.i686
    openldap-debuginfo-2.4.40-16.36.amzn1.i686
    openldap-servers-sql-2.4.40-16.36.amzn1.i686

src:
    openldap-2.4.40-16.36.amzn1.src

x86_64:
    openldap-2.4.40-16.36.amzn1.x86_64
    openldap-servers-2.4.40-16.36.amzn1.x86_64
    openldap-devel-2.4.40-16.36.amzn1.x86_64
    openldap-debuginfo-2.4.40-16.36.amzn1.x86_64
    openldap-servers-sql-2.4.40-16.36.amzn1.x86_64
    openldap-clients-2.4.40-16.36.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

openldap: before 2.4.40-16.36

CPE2.3 External links

http://alas.aws.amazon.com/ALAS-2023-1741.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Integer underflow

EUVDB-ID: #VU50395

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-36228

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to integer underflow when processing the certificate list exact assertion. A remote attacker can send a specially crafted request to the slapd, trigger integer underflow and perform a denial of service (DoS) attack.


Mitigation

Update the affected packages:

i686:
    openldap-clients-2.4.40-16.36.amzn1.i686
    openldap-servers-2.4.40-16.36.amzn1.i686
    openldap-devel-2.4.40-16.36.amzn1.i686
    openldap-2.4.40-16.36.amzn1.i686
    openldap-debuginfo-2.4.40-16.36.amzn1.i686
    openldap-servers-sql-2.4.40-16.36.amzn1.i686

src:
    openldap-2.4.40-16.36.amzn1.src

x86_64:
    openldap-2.4.40-16.36.amzn1.x86_64
    openldap-servers-2.4.40-16.36.amzn1.x86_64
    openldap-devel-2.4.40-16.36.amzn1.x86_64
    openldap-debuginfo-2.4.40-16.36.amzn1.x86_64
    openldap-servers-sql-2.4.40-16.36.amzn1.x86_64
    openldap-clients-2.4.40-16.36.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

openldap: before 2.4.40-16.36

CPE2.3 External links

http://alas.aws.amazon.com/ALAS-2023-1741.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Type Confusion

EUVDB-ID: #VU50396

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-36229

CWE-ID: CWE-843 - Type confusion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a type confusion error in ldap_X509dn2bv when parsing X.509 DN in ad_keystring. A remote attacker can send a specially crafted request to slapd and crash it.

Mitigation

Update the affected packages:

i686:
    openldap-clients-2.4.40-16.36.amzn1.i686
    openldap-servers-2.4.40-16.36.amzn1.i686
    openldap-devel-2.4.40-16.36.amzn1.i686
    openldap-2.4.40-16.36.amzn1.i686
    openldap-debuginfo-2.4.40-16.36.amzn1.i686
    openldap-servers-sql-2.4.40-16.36.amzn1.i686

src:
    openldap-2.4.40-16.36.amzn1.src

x86_64:
    openldap-2.4.40-16.36.amzn1.x86_64
    openldap-servers-2.4.40-16.36.amzn1.x86_64
    openldap-devel-2.4.40-16.36.amzn1.x86_64
    openldap-debuginfo-2.4.40-16.36.amzn1.x86_64
    openldap-servers-sql-2.4.40-16.36.amzn1.x86_64
    openldap-clients-2.4.40-16.36.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

openldap: before 2.4.40-16.36

CPE2.3 External links

http://alas.aws.amazon.com/ALAS-2023-1741.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Reachable Assertion

EUVDB-ID: #VU50397

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-36230

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion when parsing the X.509 DN within the ber_next_element() function in decode.c. A remote attacker can send a specially crafted request to slapd and perform a denial of service (DoS) attack.

Mitigation

Update the affected packages:

i686:
    openldap-clients-2.4.40-16.36.amzn1.i686
    openldap-servers-2.4.40-16.36.amzn1.i686
    openldap-devel-2.4.40-16.36.amzn1.i686
    openldap-2.4.40-16.36.amzn1.i686
    openldap-debuginfo-2.4.40-16.36.amzn1.i686
    openldap-servers-sql-2.4.40-16.36.amzn1.i686

src:
    openldap-2.4.40-16.36.amzn1.src

x86_64:
    openldap-2.4.40-16.36.amzn1.x86_64
    openldap-servers-2.4.40-16.36.amzn1.x86_64
    openldap-devel-2.4.40-16.36.amzn1.x86_64
    openldap-debuginfo-2.4.40-16.36.amzn1.x86_64
    openldap-servers-sql-2.4.40-16.36.amzn1.x86_64
    openldap-clients-2.4.40-16.36.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

openldap: before 2.4.40-16.36

CPE2.3 External links

http://alas.aws.amazon.com/ALAS-2023-1741.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Reachable Assertion

EUVDB-ID: #VU50779

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-27212

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion when processing LDAP packets within the issuerAndThisUpdateCheck() function in  schema_init.c. A remote attacker can send a specially crafted packet with a short timestamp to the slapd and perform a denial of service (DoS) attack.

Mitigation

Update the affected packages:

i686:
    openldap-clients-2.4.40-16.36.amzn1.i686
    openldap-servers-2.4.40-16.36.amzn1.i686
    openldap-devel-2.4.40-16.36.amzn1.i686
    openldap-2.4.40-16.36.amzn1.i686
    openldap-debuginfo-2.4.40-16.36.amzn1.i686
    openldap-servers-sql-2.4.40-16.36.amzn1.i686

src:
    openldap-2.4.40-16.36.amzn1.src

x86_64:
    openldap-2.4.40-16.36.amzn1.x86_64
    openldap-servers-2.4.40-16.36.amzn1.x86_64
    openldap-devel-2.4.40-16.36.amzn1.x86_64
    openldap-debuginfo-2.4.40-16.36.amzn1.x86_64
    openldap-servers-sql-2.4.40-16.36.amzn1.x86_64
    openldap-clients-2.4.40-16.36.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

openldap: before 2.4.40-16.36

CPE2.3 External links

http://alas.aws.amazon.com/ALAS-2023-1741.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###