Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2017-2668
Vulnerability from cvelistv5
Published
2018-06-22 13:00
Modified
2024-08-05 14:02
Severity ?
EPSS score ?
Summary
389-ds-base before versions 1.3.5.17 and 1.3.6.10 is vulnerable to an invalid pointer dereference in the way LDAP bind requests are handled. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | [UNKNOWN] | 389-ds-base |
Version: 389-ds-base 1.3.5.17 Version: 389-ds-base 1.3.6.10 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:02:07.340Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2017:0920", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:0920" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2668" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://pagure.io/389-ds-base/issue/49220" }, { "name": "97524", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/97524" }, { "name": "RHSA-2017:0893", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:0893" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "389-ds-base", "vendor": "[UNKNOWN]", "versions": [ { "status": "affected", "version": "389-ds-base 1.3.5.17" }, { "status": "affected", "version": "389-ds-base 1.3.6.10" } ] } ], "datePublic": "2017-04-10T00:00:00", "descriptions": [ { "lang": "en", "value": "389-ds-base before versions 1.3.5.17 and 1.3.6.10 is vulnerable to an invalid pointer dereference in the way LDAP bind requests are handled. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-06-23T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2017:0920", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:0920" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2668" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://pagure.io/389-ds-base/issue/49220" }, { "name": "97524", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/97524" }, { "name": "RHSA-2017:0893", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:0893" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2017-2668", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "389-ds-base", "version": { "version_data": [ { "version_value": "389-ds-base 1.3.5.17" }, { "version_value": "389-ds-base 1.3.6.10" } ] } } ] }, "vendor_name": "[UNKNOWN]" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "389-ds-base before versions 1.3.5.17 and 1.3.6.10 is vulnerable to an invalid pointer dereference in the way LDAP bind requests are handled. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service." } ] }, "impact": { "cvss": [ [ { "vectorString": "6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2017:0920", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:0920" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2668", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2668" }, { "name": "https://pagure.io/389-ds-base/issue/49220", "refsource": "CONFIRM", "url": "https://pagure.io/389-ds-base/issue/49220" }, { "name": "97524", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97524" }, { "name": "RHSA-2017:0893", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:0893" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2017-2668", "datePublished": "2018-06-22T13:00:00", "dateReserved": "2016-12-01T00:00:00", "dateUpdated": "2024-08-05T14:02:07.340Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-2668\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2018-06-22T13:29:00.213\",\"lastModified\":\"2024-11-21T03:23:56.440\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"389-ds-base before versions 1.3.5.17 and 1.3.6.10 is vulnerable to an invalid pointer dereference in the way LDAP bind requests are handled. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service.\"},{\"lang\":\"es\",\"value\":\"389-ds-base en versiones anteriores a la 1.3.5.17 y 1.3.6.10 es vulnerable a una desreferencia de puntero inv\u00e1lido en la forma en la que se gestionan las peticiones LDAP. Un atacante remoto no autenticado podr\u00eda emplear este error para hacer que ns-slapd se cierre inesperadamente mediante una petici\u00f3n bind LDAP especialmente manipulada que resulta en una denegaci\u00f3n de servicio (DoS).\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.3.5.0\",\"versionEndExcluding\":\"1.3.5.17\",\"matchCriteriaId\":\"D834E7AF-34D0-47D2-8556-C32E22FBA651\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.3.6.0\",\"versionEndExcluding\":\"1.3.6.10\",\"matchCriteriaId\":\"77128973-2750-48DC-9F5D-FD62B15AA106\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/97524\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:0893\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:0920\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2668\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://pagure.io/389-ds-base/issue/49220\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/97524\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:0893\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:0920\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2668\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://pagure.io/389-ds-base/issue/49220\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]}]}}" } }
gsd-2017-2668
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
389-ds-base before versions 1.3.5.17 and 1.3.6.10 is vulnerable to an invalid pointer dereference in the way LDAP bind requests are handled. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2017-2668", "description": "389-ds-base before versions 1.3.5.17 and 1.3.6.10 is vulnerable to an invalid pointer dereference in the way LDAP bind requests are handled. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service.", "id": "GSD-2017-2668", "references": [ "https://www.suse.com/security/cve/CVE-2017-2668.html", "https://access.redhat.com/errata/RHSA-2017:0920", "https://access.redhat.com/errata/RHSA-2017:0893", "https://advisories.mageia.org/CVE-2017-2668.html", "https://alas.aws.amazon.com/cve/html/CVE-2017-2668.html", "https://linux.oracle.com/cve/CVE-2017-2668.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-2668" ], "details": "389-ds-base before versions 1.3.5.17 and 1.3.6.10 is vulnerable to an invalid pointer dereference in the way LDAP bind requests are handled. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service.", "id": "GSD-2017-2668", "modified": "2023-12-13T01:21:05.800297Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2017-2668", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "389-ds-base", "version": { "version_data": [ { "version_value": "389-ds-base 1.3.5.17" }, { "version_value": "389-ds-base 1.3.6.10" } ] } } ] }, "vendor_name": "[UNKNOWN]" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "389-ds-base before versions 1.3.5.17 and 1.3.6.10 is vulnerable to an invalid pointer dereference in the way LDAP bind requests are handled. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service." } ] }, "impact": { "cvss": [ [ { "vectorString": "6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2017:0920", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:0920" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2668", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2668" }, { "name": "https://pagure.io/389-ds-base/issue/49220", "refsource": "CONFIRM", "url": "https://pagure.io/389-ds-base/issue/49220" }, { "name": "97524", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97524" }, { "name": "RHSA-2017:0893", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:0893" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.3.5.17", "versionStartIncluding": "1.3.5.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.3.6.10", "versionStartIncluding": "1.3.6.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2017-2668" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "389-ds-base before versions 1.3.5.17 and 1.3.6.10 is vulnerable to an invalid pointer dereference in the way LDAP bind requests are handled. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-476" } ] } ] }, "references": { "reference_data": [ { "name": "https://pagure.io/389-ds-base/issue/49220", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://pagure.io/389-ds-base/issue/49220" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2668", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2668" }, { "name": "RHSA-2017:0920", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:0920" }, { "name": "RHSA-2017:0893", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:0893" }, { "name": "97524", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97524" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } }, "lastModifiedDate": "2019-10-09T23:27Z", "publishedDate": "2018-06-22T13:29Z" } } }
ghsa-8xf9-83fh-q7rf
Vulnerability from github
Published
2022-05-13 01:36
Modified
2022-05-13 01:36
Severity ?
Details
389-ds-base before versions 1.3.5.17 and 1.3.6.10 is vulnerable to an invalid pointer dereference in the way LDAP bind requests are handled. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service.
{ "affected": [], "aliases": [ "CVE-2017-2668" ], "database_specific": { "cwe_ids": [ "CWE-476" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-06-22T13:29:00Z", "severity": "MODERATE" }, "details": "389-ds-base before versions 1.3.5.17 and 1.3.6.10 is vulnerable to an invalid pointer dereference in the way LDAP bind requests are handled. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service.", "id": "GHSA-8xf9-83fh-q7rf", "modified": "2022-05-13T01:36:49Z", "published": "2022-05-13T01:36:49Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2668" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:0893" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:0920" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2668" }, { "type": "WEB", "url": "https://pagure.io/389-ds-base/issue/49220" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/97524" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
rhsa-2017_0920
Vulnerability from csaf_redhat
Published
2017-04-12 12:27
Modified
2024-11-22 10:54
Summary
Red Hat Security Advisory: 389-ds-base security and bug fix update
Notes
Topic
An update for 389-ds-base is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.
Security Fix(es):
* An invalid pointer dereference flaw was found in the way 389-ds-base handled LDAP bind requests. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service. (CVE-2017-2668)
Red Hat would like to thank Joachim Jabs (F24) for reporting this issue.
Bug Fix(es):
* Previously, when adding a filtered role definition that uses the "nsrole" virtual attribute in the filter, Directory Server terminated unexpectedly. A patch has been applied, and now the roles plug-in ignores all virtual attributes. As a result, an error message is logged when an invalid filter is used. Additionally, the role is deactivated and Directory Server no longer fails. (BZ#1429498)
* In a replication topology, Directory Server incorrectly calculated the size of string format entries when a lot of entries were deleted. The calculated size of entries was smaller than the actual required size. Consequently, Directory Server allocated insufficient memory and terminated unexpectedly when the data was written to it. With this update, the size of string format entries is now calculated correctly in the described situation and Directory Server no longer terminates unexpectedly. (BZ#1429495)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for 389-ds-base is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.\n\nSecurity Fix(es):\n\n* An invalid pointer dereference flaw was found in the way 389-ds-base handled LDAP bind requests. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service. (CVE-2017-2668)\n\nRed Hat would like to thank Joachim Jabs (F24) for reporting this issue.\n\nBug Fix(es):\n\n* Previously, when adding a filtered role definition that uses the \"nsrole\" virtual attribute in the filter, Directory Server terminated unexpectedly. A patch has been applied, and now the roles plug-in ignores all virtual attributes. As a result, an error message is logged when an invalid filter is used. Additionally, the role is deactivated and Directory Server no longer fails. (BZ#1429498)\n\n* In a replication topology, Directory Server incorrectly calculated the size of string format entries when a lot of entries were deleted. The calculated size of entries was smaller than the actual required size. Consequently, Directory Server allocated insufficient memory and terminated unexpectedly when the data was written to it. With this update, the size of string format entries is now calculated correctly in the described situation and Directory Server no longer terminates unexpectedly. (BZ#1429495)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:0920", "url": "https://access.redhat.com/errata/RHSA-2017:0920" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1429495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1429495" }, { "category": "external", "summary": "1429498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1429498" }, { "category": "external", "summary": "1436575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1436575" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0920.json" } ], "title": "Red Hat Security Advisory: 389-ds-base security and bug fix update", "tracking": { "current_release_date": "2024-11-22T10:54:15+00:00", "generator": { "date": "2024-11-22T10:54:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2017:0920", "initial_release_date": "2017-04-12T12:27:01+00:00", "revision_history": [ { "date": "2017-04-12T12:27:01+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-04-12T12:27:01+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T10:54:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "389-ds-base-0:1.3.5.10-20.el7_3.x86_64", "product": { "name": "389-ds-base-0:1.3.5.10-20.el7_3.x86_64", "product_id": "389-ds-base-0:1.3.5.10-20.el7_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/389-ds-base@1.3.5.10-20.el7_3?arch=x86_64" } } }, { "category": "product_version", "name": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64", "product": { "name": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64", "product_id": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/389-ds-base-debuginfo@1.3.5.10-20.el7_3?arch=x86_64" } } }, { "category": "product_version", "name": "389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64", "product": { "name": "389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64", "product_id": "389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/389-ds-base-libs@1.3.5.10-20.el7_3?arch=x86_64" } } }, { "category": "product_version", "name": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64", "product": { "name": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64", "product_id": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/389-ds-base-snmp@1.3.5.10-20.el7_3?arch=x86_64" } } }, { "category": "product_version", "name": "389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64", "product": { "name": "389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64", "product_id": "389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/389-ds-base-devel@1.3.5.10-20.el7_3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "389-ds-base-0:1.3.5.10-20.el7_3.src", "product": { "name": "389-ds-base-0:1.3.5.10-20.el7_3.src", "product_id": "389-ds-base-0:1.3.5.10-20.el7_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/389-ds-base@1.3.5.10-20.el7_3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "389-ds-base-0:1.3.5.10-20.el7_3.ppc64le", "product": { "name": "389-ds-base-0:1.3.5.10-20.el7_3.ppc64le", "product_id": "389-ds-base-0:1.3.5.10-20.el7_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/389-ds-base@1.3.5.10-20.el7_3?arch=ppc64le" } } }, { "category": "product_version", "name": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le", "product": { "name": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le", "product_id": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/389-ds-base-debuginfo@1.3.5.10-20.el7_3?arch=ppc64le" } } }, { "category": "product_version", "name": "389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le", "product": { "name": "389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le", "product_id": "389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/389-ds-base-libs@1.3.5.10-20.el7_3?arch=ppc64le" } } }, { "category": "product_version", "name": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le", "product": { "name": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le", "product_id": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/389-ds-base-snmp@1.3.5.10-20.el7_3?arch=ppc64le" } } }, { "category": "product_version", "name": "389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le", "product": { "name": "389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le", "product_id": "389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/389-ds-base-devel@1.3.5.10-20.el7_3?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "389-ds-base-0:1.3.5.10-20.el7_3.aarch64", "product": { "name": "389-ds-base-0:1.3.5.10-20.el7_3.aarch64", "product_id": "389-ds-base-0:1.3.5.10-20.el7_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/389-ds-base@1.3.5.10-20.el7_3?arch=aarch64" } } }, { "category": "product_version", "name": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64", "product": { "name": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64", "product_id": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/389-ds-base-debuginfo@1.3.5.10-20.el7_3?arch=aarch64" } } }, { "category": "product_version", "name": "389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64", "product": { "name": "389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64", "product_id": "389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/389-ds-base-libs@1.3.5.10-20.el7_3?arch=aarch64" } } }, { "category": "product_version", "name": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64", "product": { "name": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64", "product_id": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/389-ds-base-snmp@1.3.5.10-20.el7_3?arch=aarch64" } } }, { "category": "product_version", "name": "389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64", "product": { "name": "389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64", "product_id": "389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/389-ds-base-devel@1.3.5.10-20.el7_3?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.3.5.10-20.el7_3.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.src" }, "product_reference": "389-ds-base-0:1.3.5.10-20.el7_3.src", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.3.5.10-20.el7_3.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.src" }, "product_reference": "389-ds-base-0:1.3.5.10-20.el7_3.src", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.3.5.10-20.el7_3.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.src" }, "product_reference": "389-ds-base-0:1.3.5.10-20.el7_3.src", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.3.5.10-20.el7_3.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.src" }, "product_reference": "389-ds-base-0:1.3.5.10-20.el7_3.src", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.3.5.10-20.el7_3.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.src" }, "product_reference": "389-ds-base-0:1.3.5.10-20.el7_3.src", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.3.5.10-20.el7_3.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.src" }, "product_reference": "389-ds-base-0:1.3.5.10-20.el7_3.src", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64" }, "product_reference": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le" }, "product_reference": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64" }, "product_reference": "389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Joachim Jabs" ], "organization": "F24" } ], "cve": "CVE-2017-2668", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2017-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1436575" } ], "notes": [ { "category": "description", "text": "An invalid pointer dereference flaw was found in the way 389-ds-base handled LDAP bind requests. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "389-ds-base: Remote crash via crafted LDAP messages", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.aarch64", "7Client-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.ppc64le", "7Client-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.src", "7Client-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.x86_64", "7Client-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64", "7Client-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le", "7Client-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64", "7Client-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64", "7Client-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le", "7Client-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64", "7Client-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64", "7Client-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le", "7Client-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64", "7Client-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64", "7Client-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le", "7Client-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.src", "7ComputeNode-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64", "7Server-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.aarch64", "7Server-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.ppc64le", "7Server-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.src", "7Server-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.x86_64", "7Server-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64", "7Server-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le", "7Server-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64", "7Server-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64", "7Server-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le", "7Server-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64", "7Server-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64", "7Server-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le", "7Server-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64", "7Server-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64", "7Server-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le", "7Server-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64", "7Server-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.aarch64", "7Server-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.ppc64le", "7Server-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.src", "7Server-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.x86_64", "7Server-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64", "7Server-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le", "7Server-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64", "7Server-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64", "7Server-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le", "7Server-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64", "7Server-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64", "7Server-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le", "7Server-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64", "7Server-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64", "7Server-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le", "7Server-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.src", "7Workstation-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.src", "7Workstation-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-2668" }, { "category": "external", "summary": "RHBZ#1436575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1436575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-2668", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2668" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-2668", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2668" } ], "release_date": "2017-04-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-04-12T12:27:01+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the 389 server service will be restarted automatically.", "product_ids": [ "7Client-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.aarch64", "7Client-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.ppc64le", "7Client-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.src", "7Client-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.x86_64", "7Client-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64", "7Client-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le", "7Client-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64", "7Client-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64", "7Client-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le", "7Client-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64", "7Client-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64", "7Client-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le", "7Client-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64", "7Client-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64", "7Client-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le", "7Client-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.src", "7ComputeNode-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64", "7Server-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.aarch64", "7Server-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.ppc64le", "7Server-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.src", "7Server-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.x86_64", "7Server-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64", "7Server-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le", "7Server-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64", "7Server-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64", "7Server-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le", "7Server-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64", "7Server-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64", "7Server-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le", "7Server-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64", "7Server-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64", "7Server-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le", "7Server-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64", "7Server-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.aarch64", "7Server-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.ppc64le", "7Server-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.src", "7Server-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.x86_64", "7Server-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64", "7Server-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le", "7Server-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64", "7Server-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64", "7Server-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le", "7Server-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64", "7Server-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64", "7Server-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le", "7Server-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64", "7Server-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64", "7Server-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le", "7Server-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.src", "7Workstation-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.src", "7Workstation-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0920" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.aarch64", "7Client-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.ppc64le", "7Client-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.src", "7Client-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.x86_64", "7Client-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64", "7Client-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le", "7Client-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64", "7Client-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64", "7Client-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le", "7Client-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64", "7Client-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64", "7Client-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le", "7Client-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64", "7Client-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64", "7Client-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le", "7Client-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.src", "7ComputeNode-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64", "7Server-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.aarch64", "7Server-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.ppc64le", "7Server-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.src", "7Server-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.x86_64", "7Server-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64", "7Server-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le", "7Server-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64", "7Server-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64", "7Server-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le", "7Server-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64", "7Server-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64", "7Server-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le", "7Server-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64", "7Server-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64", "7Server-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le", "7Server-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64", "7Server-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.aarch64", "7Server-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.ppc64le", "7Server-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.src", "7Server-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.x86_64", "7Server-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64", "7Server-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le", "7Server-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64", "7Server-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64", "7Server-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le", "7Server-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64", "7Server-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64", "7Server-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le", "7Server-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64", "7Server-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64", "7Server-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le", "7Server-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.src", "7Workstation-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.src", "7Workstation-optional-7.3.Z:389-ds-base-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-optional-7.3.Z:389-ds-base-debuginfo-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-optional-7.3.Z:389-ds-base-devel-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-optional-7.3.Z:389-ds-base-libs-0:1.3.5.10-20.el7_3.x86_64", "7Workstation-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.aarch64", "7Workstation-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.ppc64le", "7Workstation-optional-7.3.Z:389-ds-base-snmp-0:1.3.5.10-20.el7_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "389-ds-base: Remote crash via crafted LDAP messages" } ] }
rhsa-2017_0893
Vulnerability from csaf_redhat
Published
2017-04-11 11:46
Modified
2024-11-22 10:54
Summary
Red Hat Security Advisory: 389-ds-base security and bug fix update
Notes
Topic
An update for 389-ds-base is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.
Security Fix(es):
* An invalid pointer dereference flaw was found in the way 389-ds-base handled LDAP bind requests. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service. (CVE-2017-2668)
Red Hat would like to thank Joachim Jabs (F24) for reporting this issue.
Bug Fix(es):
* Previously, the "deref" plug-in failed to dereference attributes that use distinguished name (DN) syntax, such as "uniqueMember". With this patch, the "deref" plug-in can dereference such attributes and additionally "Name and Optional UID" syntax. As a result, the "deref" plug-in now supports any syntax. (BZ#1435365)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for 389-ds-base is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.\n\nSecurity Fix(es):\n\n* An invalid pointer dereference flaw was found in the way 389-ds-base handled LDAP bind requests. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service. (CVE-2017-2668)\n\nRed Hat would like to thank Joachim Jabs (F24) for reporting this issue.\n\nBug Fix(es):\n\n* Previously, the \"deref\" plug-in failed to dereference attributes that use distinguished name (DN) syntax, such as \"uniqueMember\". With this patch, the \"deref\" plug-in can dereference such attributes and additionally \"Name and Optional UID\" syntax. As a result, the \"deref\" plug-in now supports any syntax. (BZ#1435365)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:0893", "url": "https://access.redhat.com/errata/RHSA-2017:0893" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1435365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1435365" }, { "category": "external", "summary": "1436575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1436575" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0893.json" } ], "title": "Red Hat Security Advisory: 389-ds-base security and bug fix update", "tracking": { "current_release_date": "2024-11-22T10:54:20+00:00", "generator": { "date": "2024-11-22T10:54:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2017:0893", "initial_release_date": "2017-04-11T11:46:58+00:00", "revision_history": [ { "date": "2017-04-11T11:46:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-04-11T11:46:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T10:54:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "389-ds-base-0:1.2.11.15-91.el6_9.x86_64", "product": { "name": "389-ds-base-0:1.2.11.15-91.el6_9.x86_64", "product_id": "389-ds-base-0:1.2.11.15-91.el6_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/389-ds-base@1.2.11.15-91.el6_9?arch=x86_64" } } }, { "category": "product_version", "name": "389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64", "product": { "name": "389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64", "product_id": "389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/389-ds-base-libs@1.2.11.15-91.el6_9?arch=x86_64" } } }, { "category": "product_version", "name": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64", "product": { "name": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64", "product_id": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/389-ds-base-debuginfo@1.2.11.15-91.el6_9?arch=x86_64" } } }, { "category": "product_version", "name": "389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64", "product": { "name": "389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64", "product_id": "389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/389-ds-base-devel@1.2.11.15-91.el6_9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "389-ds-base-libs-0:1.2.11.15-91.el6_9.i686", "product": { "name": "389-ds-base-libs-0:1.2.11.15-91.el6_9.i686", "product_id": "389-ds-base-libs-0:1.2.11.15-91.el6_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/389-ds-base-libs@1.2.11.15-91.el6_9?arch=i686" } } }, { "category": "product_version", "name": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686", "product": { "name": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686", "product_id": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/389-ds-base-debuginfo@1.2.11.15-91.el6_9?arch=i686" } } }, { "category": "product_version", "name": "389-ds-base-devel-0:1.2.11.15-91.el6_9.i686", "product": { "name": "389-ds-base-devel-0:1.2.11.15-91.el6_9.i686", "product_id": "389-ds-base-devel-0:1.2.11.15-91.el6_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/389-ds-base-devel@1.2.11.15-91.el6_9?arch=i686" } } }, { "category": "product_version", "name": "389-ds-base-0:1.2.11.15-91.el6_9.i686", "product": { "name": "389-ds-base-0:1.2.11.15-91.el6_9.i686", "product_id": "389-ds-base-0:1.2.11.15-91.el6_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/389-ds-base@1.2.11.15-91.el6_9?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "389-ds-base-0:1.2.11.15-91.el6_9.src", "product": { "name": "389-ds-base-0:1.2.11.15-91.el6_9.src", "product_id": "389-ds-base-0:1.2.11.15-91.el6_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/389-ds-base@1.2.11.15-91.el6_9?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.2.11.15-91.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.i686" }, "product_reference": "389-ds-base-0:1.2.11.15-91.el6_9.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.2.11.15-91.el6_9.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.src" }, "product_reference": "389-ds-base-0:1.2.11.15-91.el6_9.src", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.2.11.15-91.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.x86_64" }, "product_reference": "389-ds-base-0:1.2.11.15-91.el6_9.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686" }, "product_reference": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64" }, "product_reference": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.2.11.15-91.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.i686" }, "product_reference": "389-ds-base-devel-0:1.2.11.15-91.el6_9.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64" }, "product_reference": "389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.2.11.15-91.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.i686" }, "product_reference": "389-ds-base-libs-0:1.2.11.15-91.el6_9.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64" }, "product_reference": "389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.2.11.15-91.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.i686" }, "product_reference": "389-ds-base-0:1.2.11.15-91.el6_9.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.2.11.15-91.el6_9.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.src" }, "product_reference": "389-ds-base-0:1.2.11.15-91.el6_9.src", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.2.11.15-91.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.x86_64" }, "product_reference": "389-ds-base-0:1.2.11.15-91.el6_9.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686" }, "product_reference": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64" }, "product_reference": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.2.11.15-91.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.i686" }, "product_reference": "389-ds-base-devel-0:1.2.11.15-91.el6_9.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64" }, "product_reference": "389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.2.11.15-91.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.i686" }, "product_reference": "389-ds-base-libs-0:1.2.11.15-91.el6_9.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64" }, "product_reference": "389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.2.11.15-91.el6_9.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.i686" }, "product_reference": "389-ds-base-0:1.2.11.15-91.el6_9.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.2.11.15-91.el6_9.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.src" }, "product_reference": "389-ds-base-0:1.2.11.15-91.el6_9.src", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.2.11.15-91.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.x86_64" }, "product_reference": "389-ds-base-0:1.2.11.15-91.el6_9.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686" }, "product_reference": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64" }, "product_reference": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.2.11.15-91.el6_9.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.i686" }, "product_reference": "389-ds-base-devel-0:1.2.11.15-91.el6_9.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64" }, "product_reference": "389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.2.11.15-91.el6_9.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.i686" }, "product_reference": "389-ds-base-libs-0:1.2.11.15-91.el6_9.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64" }, "product_reference": "389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.2.11.15-91.el6_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.i686" }, "product_reference": "389-ds-base-0:1.2.11.15-91.el6_9.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.2.11.15-91.el6_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.src" }, "product_reference": "389-ds-base-0:1.2.11.15-91.el6_9.src", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.2.11.15-91.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.x86_64" }, "product_reference": "389-ds-base-0:1.2.11.15-91.el6_9.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686" }, "product_reference": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64" }, "product_reference": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.2.11.15-91.el6_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.i686" }, "product_reference": "389-ds-base-devel-0:1.2.11.15-91.el6_9.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64" }, "product_reference": "389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.2.11.15-91.el6_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.i686" }, "product_reference": "389-ds-base-libs-0:1.2.11.15-91.el6_9.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64" }, "product_reference": "389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.2.11.15-91.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.i686" }, "product_reference": "389-ds-base-0:1.2.11.15-91.el6_9.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.2.11.15-91.el6_9.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.src" }, "product_reference": "389-ds-base-0:1.2.11.15-91.el6_9.src", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.2.11.15-91.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.x86_64" }, "product_reference": "389-ds-base-0:1.2.11.15-91.el6_9.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686" }, "product_reference": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64" }, "product_reference": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.2.11.15-91.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.i686" }, "product_reference": "389-ds-base-devel-0:1.2.11.15-91.el6_9.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64" }, "product_reference": "389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.2.11.15-91.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.i686" }, "product_reference": "389-ds-base-libs-0:1.2.11.15-91.el6_9.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64" }, "product_reference": "389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.2.11.15-91.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.i686" }, "product_reference": "389-ds-base-0:1.2.11.15-91.el6_9.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.2.11.15-91.el6_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.src" }, "product_reference": "389-ds-base-0:1.2.11.15-91.el6_9.src", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-0:1.2.11.15-91.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.x86_64" }, "product_reference": "389-ds-base-0:1.2.11.15-91.el6_9.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686" }, "product_reference": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64" }, "product_reference": "389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.2.11.15-91.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.i686" }, "product_reference": "389-ds-base-devel-0:1.2.11.15-91.el6_9.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64" }, "product_reference": "389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.2.11.15-91.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.i686" }, "product_reference": "389-ds-base-libs-0:1.2.11.15-91.el6_9.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64" }, "product_reference": "389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Joachim Jabs" ], "organization": "F24" } ], "cve": "CVE-2017-2668", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2017-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1436575" } ], "notes": [ { "category": "description", "text": "An invalid pointer dereference flaw was found in the way 389-ds-base handled LDAP bind requests. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "389-ds-base: Remote crash via crafted LDAP messages", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.i686", "6Client-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.src", "6Client-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.x86_64", "6Client-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686", "6Client-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64", "6Client-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.i686", "6Client-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64", "6Client-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.i686", "6Client-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64", "6ComputeNode-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.i686", "6ComputeNode-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.src", "6ComputeNode-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.x86_64", "6ComputeNode-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686", "6ComputeNode-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64", "6ComputeNode-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.i686", "6ComputeNode-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64", "6ComputeNode-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.i686", "6ComputeNode-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64", "6Server-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.i686", "6Server-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.src", "6Server-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.x86_64", "6Server-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686", "6Server-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64", "6Server-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.i686", "6Server-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64", "6Server-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.i686", "6Server-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64", "6Server-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.i686", "6Server-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.src", "6Server-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.x86_64", "6Server-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686", "6Server-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64", "6Server-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.i686", "6Server-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64", "6Server-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.i686", "6Server-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64", "6Workstation-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.i686", "6Workstation-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.src", "6Workstation-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.x86_64", "6Workstation-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686", "6Workstation-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64", "6Workstation-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.i686", "6Workstation-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64", "6Workstation-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.i686", "6Workstation-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64", "6Workstation-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.i686", "6Workstation-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.src", "6Workstation-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.x86_64", "6Workstation-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686", "6Workstation-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64", "6Workstation-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.i686", "6Workstation-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64", "6Workstation-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.i686", "6Workstation-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-2668" }, { "category": "external", "summary": "RHBZ#1436575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1436575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-2668", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2668" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-2668", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2668" } ], "release_date": "2017-04-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-04-11T11:46:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the 389 server service will be restarted automatically.", "product_ids": [ "6Client-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.i686", "6Client-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.src", "6Client-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.x86_64", "6Client-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686", "6Client-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64", "6Client-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.i686", "6Client-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64", "6Client-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.i686", "6Client-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64", "6ComputeNode-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.i686", "6ComputeNode-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.src", "6ComputeNode-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.x86_64", "6ComputeNode-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686", "6ComputeNode-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64", "6ComputeNode-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.i686", "6ComputeNode-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64", "6ComputeNode-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.i686", "6ComputeNode-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64", "6Server-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.i686", "6Server-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.src", "6Server-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.x86_64", "6Server-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686", "6Server-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64", "6Server-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.i686", "6Server-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64", "6Server-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.i686", "6Server-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64", "6Server-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.i686", "6Server-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.src", "6Server-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.x86_64", "6Server-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686", "6Server-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64", "6Server-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.i686", "6Server-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64", "6Server-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.i686", "6Server-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64", "6Workstation-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.i686", "6Workstation-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.src", "6Workstation-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.x86_64", "6Workstation-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686", "6Workstation-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64", "6Workstation-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.i686", "6Workstation-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64", "6Workstation-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.i686", "6Workstation-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64", "6Workstation-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.i686", "6Workstation-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.src", "6Workstation-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.x86_64", "6Workstation-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686", "6Workstation-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64", "6Workstation-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.i686", "6Workstation-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64", "6Workstation-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.i686", "6Workstation-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0893" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.i686", "6Client-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.src", "6Client-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.x86_64", "6Client-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686", "6Client-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64", "6Client-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.i686", "6Client-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64", "6Client-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.i686", "6Client-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64", "6ComputeNode-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.i686", "6ComputeNode-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.src", "6ComputeNode-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.x86_64", "6ComputeNode-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686", "6ComputeNode-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64", "6ComputeNode-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.i686", "6ComputeNode-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64", "6ComputeNode-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.i686", "6ComputeNode-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64", "6Server-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.i686", "6Server-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.src", "6Server-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.x86_64", "6Server-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686", "6Server-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64", "6Server-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.i686", "6Server-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64", "6Server-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.i686", "6Server-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64", "6Server-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.i686", "6Server-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.src", "6Server-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.x86_64", "6Server-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686", "6Server-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64", "6Server-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.i686", "6Server-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64", "6Server-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.i686", "6Server-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64", "6Workstation-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.i686", "6Workstation-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.src", "6Workstation-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.x86_64", "6Workstation-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686", "6Workstation-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64", "6Workstation-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.i686", "6Workstation-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64", "6Workstation-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.i686", "6Workstation-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64", "6Workstation-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.i686", "6Workstation-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.src", "6Workstation-optional-6.9.z:389-ds-base-0:1.2.11.15-91.el6_9.x86_64", "6Workstation-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.i686", "6Workstation-optional-6.9.z:389-ds-base-debuginfo-0:1.2.11.15-91.el6_9.x86_64", "6Workstation-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.i686", "6Workstation-optional-6.9.z:389-ds-base-devel-0:1.2.11.15-91.el6_9.x86_64", "6Workstation-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.i686", "6Workstation-optional-6.9.z:389-ds-base-libs-0:1.2.11.15-91.el6_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "389-ds-base: Remote crash via crafted LDAP messages" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.