Bug 1188455 - (CVE-2021-3652) VUL-0: CVE-2021-3652: 389-ds: CRYPT password hash with asterisk allows any bind attempt to succeed
(CVE-2021-3652)
VUL-0: CVE-2021-3652: 389-ds: CRYPT password hash with asterisk allows any bi...
Status: NEW
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/304470/
CVSSv3.1:SUSE:CVE-2021-3652:6.5:(AV:N...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2021-07-19 12:19 UTC by Marcus Meissner
Modified: 2022-06-23 16:16 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2021-07-19 12:19:59 UTC
rh#1982782

It was found that invalid password hashes were not correctly handled by 389-ds-base.

Asterisks, '*', is a method that can be used in NIS database, or /etc/shadow, to disable an account's password. As a result of the flaw, if an LDAP admin imports such an account from a NIS or /etc/shadow database into Directory Server, any password will be valid for that account.

Reference : https://github.com/389ds/389-ds-base/issues/4817

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1982782
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3652
Comment 4 Swamp Workflow Management 2021-08-20 13:37:29 UTC
# maintenance_jira_update_notice
openSUSE-SU-2021:2801-1: An update that solves one vulnerability and has one errata is now available.

Category: security (moderate)
Bug References: 1188151,1188455
CVE References: CVE-2021-3652
JIRA References: 
Sources used:
openSUSE Leap 15.3 (src):    389-ds-1.4.4.16~git16.c1926dfc6-3.4.1
Comment 5 Swamp Workflow Management 2021-08-20 13:54:02 UTC
# maintenance_jira_update_notice
SUSE-SU-2021:2801-1: An update that solves one vulnerability and has one errata is now available.

Category: security (moderate)
Bug References: 1188151,1188455
CVE References: CVE-2021-3652
JIRA References: 
Sources used:
SUSE Linux Enterprise Module for Server Applications 15-SP3 (src):    389-ds-1.4.4.16~git16.c1926dfc6-3.4.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 6 Swamp Workflow Management 2021-08-27 13:19:16 UTC
# maintenance_jira_update_notice
SUSE-SU-2021:2857-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1188455
CVE References: CVE-2021-3652
JIRA References: 
Sources used:
SUSE Linux Enterprise Module for Server Applications 15-SP2 (src):    389-ds-1.4.3.24~git13.7b705e743-3.19.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Swamp Workflow Management 2021-08-30 19:21:01 UTC
# maintenance_jira_update_notice
openSUSE-SU-2021:1211-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1188455
CVE References: CVE-2021-3652
JIRA References: 
Sources used:
openSUSE Leap 15.2 (src):    389-ds-1.4.3.24~git13.7b705e743-lp152.2.18.1
Comment 8 William Brown 2022-06-02 00:10:04 UTC
Fixes have existed for a while, I forgot to assign back to security.
Comment 9 Thomas Leroy 2022-06-07 06:53:40 UTC
Hi William, I think we're still missing a submission for SUSE:SLE-15:Update and SUSE:SLE-15-SP1:Update...
Comment 10 William Brown 2022-06-08 05:05:13 UTC
(In reply to Thomas Leroy from comment #9)
> Hi William, I think we're still missing a submission for SUSE:SLE-15:Update
> and SUSE:SLE-15-SP1:Update...

There was a QA issue on SP1 that's been resolved now, let me check about 15 ...
Comment 11 William Brown 2022-06-08 05:52:42 UTC
Okay was missed from 15, submitting now.
Comment 16 Swamp Workflow Management 2022-06-16 19:31:43 UTC
SUSE-SU-2022:2109-1: An update that fixes three vulnerabilities is now available.

Category: security (important)
Bug References: 1188455,1195324,1199889
CVE References: CVE-2021-3652,CVE-2021-4091,CVE-2022-1949
JIRA References: 
Sources used:
SUSE Linux Enterprise Server for SAP 15 (src):    389-ds-1.4.0.31~git15.8b9843b0b-150000.4.27.1
SUSE Linux Enterprise Server 15-LTSS (src):    389-ds-1.4.0.31~git15.8b9843b0b-150000.4.27.1
SUSE Linux Enterprise High Performance Computing 15-LTSS (src):    389-ds-1.4.0.31~git15.8b9843b0b-150000.4.27.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS (src):    389-ds-1.4.0.31~git15.8b9843b0b-150000.4.27.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 17 Swamp Workflow Management 2022-06-23 16:16:47 UTC
SUSE-SU-2022:2163-1: An update that solves 5 vulnerabilities and has one errata is now available.

Category: security (important)
Bug References: 1188455,1195324,1197275,1197345,1199889,1200175
CVE References: CVE-2021-3652,CVE-2021-4091,CVE-2022-0918,CVE-2022-0996,CVE-2022-1949
JIRA References: 
Sources used:
SUSE Linux Enterprise Server for SAP 15-SP1 (src):    389-ds-1.4.2.16~git68.efa843752-150100.7.34.1
SUSE Linux Enterprise Server 15-SP1-LTSS (src):    389-ds-1.4.2.16~git68.efa843752-150100.7.34.1
SUSE Linux Enterprise Server 15-SP1-BCL (src):    389-ds-1.4.2.16~git68.efa843752-150100.7.34.1
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src):    389-ds-1.4.2.16~git68.efa843752-150100.7.34.1
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src):    389-ds-1.4.2.16~git68.efa843752-150100.7.34.1
SUSE Enterprise Storage 6 (src):    389-ds-1.4.2.16~git68.efa843752-150100.7.34.1
SUSE CaaS Platform 4.0 (src):    389-ds-1.4.2.16~git68.efa843752-150100.7.34.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.