Rapid7 Vulnerability & Exploit Database

RHSA-2011:0347: openldap security update

Back to Search

RHSA-2011:0347: openldap security update

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
03/19/2011
Created
07/25/2018
Added
03/19/2011
Modified
07/04/2017

Description

OpenLDAP is an open source suite of LDAP (Lightweight Directory AccessProtocol) applications and development tools.A flaw was found in the way OpenLDAP handled authentication failures beingpassed from an OpenLDAP slave to the master. If OpenLDAP was configuredwith a chain overlay and it forwarded authentication failures, OpenLDAPwould bind to the directory as an anonymous user and return success, ratherthan return failure on the authenticated bind. This could allow a user on asystem that uses LDAP for authentication to log into a directory-basedaccount without knowing the password. (CVE-2011-1024)It was found that the OpenLDAP back-ndb back end allowed successfulauthentication to the root distinguished name (DN) when any string wasprovided as a password. A remote user could use this flaw to access anOpenLDAP directory if they knew the value of the root DN. Note: This issueonly affected OpenLDAP installations using the NDB back-end, which is onlyavailable for Red Hat Enterprise Linux 6 via third-party software.(CVE-2011-1025)A flaw was found in the way OpenLDAP handled modify relative distinguishedname (modrdn) requests. A remote, unauthenticated user could use this flawto crash an OpenLDAP server via a modrdn request containing an empty oldRDN value. (CVE-2011-1081)Users of OpenLDAP should upgrade to these updated packages, which containbackported patches to resolve these issues. After installing this update,the OpenLDAP daemons will be restarted automatically.

Solution(s)

  • redhat-upgrade-compat-openldap
  • redhat-upgrade-openldap
  • redhat-upgrade-openldap-clients
  • redhat-upgrade-openldap-debuginfo
  • redhat-upgrade-openldap-devel
  • redhat-upgrade-openldap-servers
  • redhat-upgrade-openldap-servers-sql

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;