what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2016-0014-01

Red Hat Security Advisory 2016-0014-01
Posted Jan 8, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0014-01 - The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases. A denial of service flaw was found in the ldb_wildcard_compare() function of libldb. A remote attacker could send a specially crafted packet that, when processed by an application using libldb, would cause that application to consume an excessive amount of memory and crash. A memory-read flaw was found in the way the libldb library processed LDB DN records with a null byte. An authenticated, remote attacker could use this flaw to read heap-memory pages from the server.

tags | advisory, remote, denial of service, local
systems | linux, redhat
advisories | CVE-2015-3223, CVE-2015-5330
SHA-256 | b68687782b26d57dd2c5e68c3efd3463fe80d9a646ae0980128e2a9152d079f3

Red Hat Security Advisory 2016-0014-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: libldb security update
Advisory ID: RHSA-2016:0014-01
Product: Red Hat Gluster Storage
Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-0014.html
Issue date: 2016-01-08
CVE Names: CVE-2015-3223 CVE-2015-5330
=====================================================================

1. Summary:

Updated libldb packages that fix two security issues are now available for
Red Hat Gluster Storage 3.1.

Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

2. Relevant releases/architectures:

Red Hat Gluster Storage Server 3.1 on RHEL-6 - x86_64
Red Hat Gluster Storage Server 3.1 on RHEL-7 - x86_64

3. Description:

The libldb packages provide an extensible library that implements an
LDAP-like API to access remote LDAP servers, or use local TDB databases.

A denial of service flaw was found in the ldb_wildcard_compare() function
of libldb. A remote attacker could send a specially crafted packet that,
when processed by an application using libldb (for example the AD LDAP
server in Samba), would cause that application to consume an excessive
amount of memory and crash. (CVE-2015-3223)

A memory-read flaw was found in the way the libldb library processed LDB DN
records with a null byte. An authenticated, remote attacker could use this
flaw to read heap-memory pages from the server. (CVE-2015-5330)

Red Hat would like to thank the Samba project for reporting these issues.
Upstream acknowledges Thilo Uttendorfer as the original reporter of
CVE-2015-3223, and Douglas Bagnall as the original reporter of
CVE-2015-5330.

All libldb users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1281326 - CVE-2015-5330 samba, libldb: remote memory read in the Samba LDAP server
1290287 - CVE-2015-3223 libldb: Remote DoS in Samba (AD) LDAP server

6. Package List:

Red Hat Gluster Storage Server 3.1 on RHEL-6:

Source:
libldb-1.1.20-3.el6rhs.src.rpm

x86_64:
ldb-tools-1.1.20-3.el6rhs.x86_64.rpm
libldb-1.1.20-3.el6rhs.x86_64.rpm
libldb-debuginfo-1.1.20-3.el6rhs.x86_64.rpm
libldb-devel-1.1.20-3.el6rhs.x86_64.rpm
pyldb-1.1.20-3.el6rhs.x86_64.rpm
pyldb-devel-1.1.20-3.el6rhs.x86_64.rpm

Red Hat Gluster Storage Server 3.1 on RHEL-7:

Source:
libldb-1.1.20-3.el7rhgs.src.rpm

x86_64:
ldb-tools-1.1.20-3.el7rhgs.x86_64.rpm
libldb-1.1.20-3.el7rhgs.x86_64.rpm
libldb-debuginfo-1.1.20-3.el7rhgs.x86_64.rpm
libldb-devel-1.1.20-3.el7rhgs.x86_64.rpm
pyldb-1.1.20-3.el7rhgs.x86_64.rpm
pyldb-devel-1.1.20-3.el7rhgs.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2015-3223
https://access.redhat.com/security/cve/CVE-2015-5330
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2016 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFWj5+BXlSAg2UNWIIRAuvXAJ9kTRcx9VLmVo+OLeLoQBjlO7DznQCeKUxR
RlUHhT7G1nNUKHTNMfcZAbI=
=VKRR
-----END PGP SIGNATURE-----


--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    0 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close