drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in redhat-ds
Name: |
Mehrere Probleme in redhat-ds |
|
ID: |
RHSA-2025:1632 |
|
Distribution: |
Red Hat |
|
Plattformen: |
Red Hat Directory Server 11.5 E4S for RHEL 8 |
|
Datum: |
Di, 18. Februar 2025, 22:33 |
|
Referenzen: |
https://access.redhat.com/security/cve/CVE-2024-2199
https://access.redhat.com/security/cve/CVE-2024-1062
https://bugzilla.redhat.com/show_bug.cgi?id=2292104
https://access.redhat.com/errata/RHSA-2025:1632
https://bugzilla.redhat.com/show_bug.cgi?id=2267976
https://access.redhat.com/security/cve/CVE-2024-3657
https://access.redhat.com/security/cve/CVE-2024-5953
https://bugzilla.redhat.com/show_bug.cgi?id=2274401
https://bugzilla.redhat.com/show_bug.cgi?id=2261879 |
|
Applikationen: |
389 Directory Server |
|
Originalnachricht |
An update for the redhat-ds:11 module is now available for Red Hat Directory Server 11.5 E4S for RHEL 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Red Hat Directory Server is an LDAPv3-compliant directory server. The suite of packages includes the Lightweight Directory Access Protocol (LDAP) server, as well as command-line utilities and Web UI packages for server administration.
Security Fix(es):
* 389-ds-base: a heap overflow leading to denail-of-servce while writing a value larger than 256 chars (in log_entry_attr) (CVE-2024-1062)
* 389-ds-base: Malformed userPassword may cause crash at do_modify in slapd/modify.c (CVE-2024-2199)
* 389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request (CVE-2024-3657)
* 389-ds-base: Malformed userPassword hash may cause Denial of Service (CVE-2024-5953)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
CVE-2024-1062: Heap-based Buffer Overflow (CWE-122) CVE-2024-2199: Improper Input Validation (CWE-20) CVE-2024-3657: Improper Input Validation (CWE-20) CVE-2024-5953: Improper Validation of Consistency within Input (CWE-1288)
|
|
|
|