Rapid7 Vulnerability & Exploit Database

RHSA-2012:0997: 389-ds-base security update

Back to Search

RHSA-2012:0997: 389-ds-base security update

Severity
2
CVSS
(AV:N/AC:H/Au:S/C:P/I:N/A:N)
Published
06/20/2012
Created
07/25/2018
Added
06/28/2012
Modified
07/04/2017

Description

The 389 Directory Server is an LDAPv3 compliant server. The base packagesinclude the Lightweight Directory Access Protocol (LDAP) server andcommand-line utilities for server administration.A flaw was found in the way 389 Directory Server handled password changes.If an LDAP user has changed their password, and the directory server hasnot been restarted since that change, an attacker able to bind to thedirectory server could obtain the plain text version of that user'spassword via the "unhashed#user#password" attribute. (CVE-2012-2678)It was found that when the password for an LDAP user was changed, and auditlogging was enabled (it is disabled by default), the new password waswritten to the audit log in plain text form. This update introduces a newconfiguration parameter, "nsslapd-auditlog-logging-hide-unhashed-pw", whichwhen set to "on" (the default option), prevents 389 Directory Server fromwriting plain text passwords to the audit log. This option can beconfigured in "/etc/dirsrv/slapd-[ID]/dse.ldif". (CVE-2012-2746)All users of 389-ds-base are advised to upgrade to these updated packages,which resolve these issues. After installing this update, the 389 serverservice will be restarted automatically.

Solution(s)

  • redhat-upgrade-389-ds-base
  • redhat-upgrade-389-ds-base-debuginfo
  • redhat-upgrade-389-ds-base-devel
  • redhat-upgrade-389-ds-base-libs

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;