CVE-2017-2591

Published: 30 April 2018

389-ds-base before version 1.3.6 is vulnerable to an improperly NULL terminated array in the uniqueness_entry_to_config() function in the "attribute uniqueness" plugin of 389 Directory Server. An authenticated, or possibly unauthenticated, attacker could use this flaw to force an out-of-bound heap memory read, possibly triggering a crash of the LDAP service.

Priority

Medium

CVSS 3 base score: 7.5

Status

Package Release Status
389-ds-base
Launchpad, Ubuntu, Debian
Upstream
Released (1.3.5.15-2)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(1.4.0.18-1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(1.4.0.18-1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable

Ubuntu 16.04 LTS (Xenial Xerus) Needed

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was not-affected [code not present])
Ubuntu 12.04 ESM (Precise Pangolin) Does not exist
(precise was needs-triage)
Patches:
Upstream: https://pagure.io/389-ds-base/c/ffda694dd622b31277da07be76d3469fad86150f

Notes

AuthorNote
leosilva the project changed its site. That's the current one: https://pagure.io/389-ds-base for commits from the older site, just copy the sha and paste with /c/<sha-commit>

References

Bugs