Bug 1226277 (CVE-2024-5953) - VUL-0: CVE-2024-5953: 389-ds: malformed userPassword hashes may cause a denial of service
Summary: VUL-0: CVE-2024-5953: 389-ds: malformed userPassword hashes may cause a denia...
Status: NEW
Alias: CVE-2024-5953
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: William Brown
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/410435/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-5953:6.5:(AV:N...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-06-13 10:13 UTC by SMASH SMASH
Modified: 2024-06-14 01:10 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-06-13 10:13:31 UTC
A denial of service vulnerability was found in 389-ds-base ldap server. This issue may allow an authenticated user to cause a server crash or hang while authenticating with an user having a malformed userPassword.
By default only the administrator may directly add hashed password that can trigger the issue. But if nsslapd-allow-hashed-passwords config parameter is turned on, any user can trigger the issue. 

The problem is triggered by adding a password to an user using the hashed format (with a hash value too long for the specified hash scheme)
Then later on when trying to authenticate on that user its triggers the buffer overflow

By default, only  administrators are allowed to add hashed passwords but there is a configuration parameter (nsslapd-allow-hashed-passwords) allowing any users to add hashed passwords and potentially trigger the DoS. 

This vulnerability affects versions: >= 1.3.7.2

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-5953
https://bugzilla.redhat.com/show_bug.cgi?id=2292104