Bugzilla – Bug 1083689
VUL-0: CVE-2018-1054: 389-ds: Denial of Service (DoS) via search filters in SetUnicodeStringFromUTF_8 in collate.c
Last modified: 2020-04-11 22:50:10 UTC
Created attachment 762483 [details] Proposed patch From: Dhiru Kholia via distros Here is a notification about a remote DoS flaw in the 389-ds-base package (389 Directory Server). NOTE: We are planning to make this flaw public on 05-March-2018. If this date changes, we will inform the list. A patch to fix this issue is attached to this email. I am not subscribed to this list. So please CC me if you have some questions or comments for me. CVE-2018-1054 ------------- 389-ds-base: remote Denial of Service (DoS) via search filters in SetUnicodeStringFromUTF_8 in collate.c A flaw was found in 389 Directory Server that affects all versions. An improper handling of the search feature with an extended filter, when read access on <attribute_name> is enabled, in SetUnicodeStringFromUTF_8 function in collate.c, can lead to out-of-bounds memory operations. This may allow a remote unauthenticated attacker to trigger a server crash, thus resulting in denial of service. CVSSv3: 7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
public, please submit
Howard, please submit.
@William: Could you please check the status of this bug?
An update to 389-ds source to 1.4.0.22 is recommended to resolve this and many other issues.
Hi, I'm not clear on why we need an ECO - these submissions have just been upstream-patch releases which are based on the 389-ds enterprise lifecycle support. The project releases minor versions specifically to address issues like this, so that we don't need to carry a large number of .patch files in the rpm. No features or other elements of the package are changing, so I'm really not clear why an ECO is needed and why this was rejected? I'm going to re-submit shortly with the latest patch release, as I really do want to get this update process sorted out and working correctly. Thanks,
SUSE-SU-2019:2155-1: An update that solves 8 vulnerabilities and has two fixes is now available. Category: security (important) Bug References: 1083689,1092187,1099465,1105606,1108674,1109609,1120189,1132385,1144797,991201 CVE References: CVE-2016-5416,CVE-2018-1054,CVE-2018-10871,CVE-2018-1089,CVE-2018-10935,CVE-2018-14638,CVE-2018-14648,CVE-2019-3883 Sources used: SUSE Linux Enterprise Module for Server Applications 15-SP1 (src): 389-ds-1.4.0.26~git0.8a2d3de6f-4.14.1 SUSE Linux Enterprise Module for Server Applications 15 (src): 389-ds-1.4.0.26~git0.8a2d3de6f-4.14.1 SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (src): 389-ds-1.4.0.26~git0.8a2d3de6f-4.14.1 SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (src): 389-ds-1.4.0.26~git0.8a2d3de6f-4.14.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
done
This is an autogenerated message for OBS integration: This bug (1083689) was mentioned in https://build.opensuse.org/request/show/793266 15.1 / 389-ds