var-201911-1016
Vulnerability from variot
A flaw was found in the 'deref' plugin of 389-ds-base where it could use the 'search' permission to display attribute values. In some configurations, this could allow an authenticated attacker to view private attributes, such as password hashes. 389-ds-base Contains a vulnerability in the use of freed memory.Information may be obtained. Red Hat 389 Directory Server (formerly known as Fedora Directory Server) is an enterprise-class Linux directory server from Red Hat. The server fully supports the LDAPv3 specification and features scalable, multi-master replication. Deref is one of the deref plugins.
The deref plugin in Red Hat 389 Directory Server has a permission check bypass vulnerability that an attacker can use to view private properties. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: 389-ds-base security and bug fix update Advisory ID: RHSA-2019:3981-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:3981 Issue date: 2019-11-26 CVE Names: CVE-2019-14824 ==================================================================== 1.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
-
7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64
-
The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.
Security Fix(es):
- 389-ds-base: Read permission check bypass via the deref plugin (CVE-2019-14824)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
-
DB Deadlock on modrdn appears to corrupt database and entry cache (BZ#1749289)
-
After audit log file is rotated, DS version string is logged after each update (BZ#1754831)
-
Extremely slow LDIF import with ldif2db (BZ#1763622)
-
ns-slapd crash on concurrent SASL BINDs, connection_call_io_layer_callbacks must hold hold c_mutex (BZ#1763627)
-
CleanAllRUV task limit not enforced (BZ#1767622)
-
Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing this update, the 389 server service will be restarted automatically.
- Bugs fixed (https://bugzilla.redhat.com/):
1747448 - CVE-2019-14824 389-ds-base: Read permission check bypass via the deref plugin 1749289 - DB Deadlock on modrdn appears to corrupt database and entry cache [rhel-7.7.z] 1754831 - After audit log file is rotated, DS version string is logged after each update [rhel-7.7.z] 1763622 - Extremely slow LDIF import with ldif2db [rhel-7.7.z] 1763627 - ns-slapd crash on concurrent SASL BINDs, connection_call_io_layer_callbacks must hold hold c_mutex [rhel-7.7.z] 1767622 - CleanAllRUV task limit not enforced [rhel-7.7.z]
- 7):
Source: 389-ds-base-1.3.9.1-12.el7_7.src.rpm
ppc64: 389-ds-base-1.3.9.1-12.el7_7.ppc64.rpm 389-ds-base-debuginfo-1.3.9.1-12.el7_7.ppc64.rpm 389-ds-base-devel-1.3.9.1-12.el7_7.ppc64.rpm 389-ds-base-libs-1.3.9.1-12.el7_7.ppc64.rpm 389-ds-base-snmp-1.3.9.1-12.el7_7.ppc64.rpm
ppc64le: 389-ds-base-debuginfo-1.3.9.1-12.el7_7.ppc64le.rpm 389-ds-base-devel-1.3.9.1-12.el7_7.ppc64le.rpm 389-ds-base-snmp-1.3.9.1-12.el7_7.ppc64le.rpm
s390x: 389-ds-base-1.3.9.1-12.el7_7.s390x.rpm 389-ds-base-debuginfo-1.3.9.1-12.el7_7.s390x.rpm 389-ds-base-devel-1.3.9.1-12.el7_7.s390x.rpm 389-ds-base-libs-1.3.9.1-12.el7_7.s390x.rpm 389-ds-base-snmp-1.3.9.1-12.el7_7.s390x.rpm
x86_64: 389-ds-base-debuginfo-1.3.9.1-12.el7_7.x86_64.rpm 389-ds-base-devel-1.3.9.1-12.el7_7.x86_64.rpm 389-ds-base-snmp-1.3.9.1-12.el7_7.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
x86_64: 389-ds-base-debuginfo-1.3.9.1-12.el7_7.x86_64.rpm 389-ds-base-devel-1.3.9.1-12.el7_7.x86_64.rpm 389-ds-base-snmp-1.3.9.1-12.el7_7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2019-14824 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBXd0wD9zjgjWX9erEAQgHUg/+N9VdnQDmeRiQopeSvr69XIUMytjLbwk1 qzX1z2FUIjJCHOFrxGq43aellPmu2K+opzhvrcpSaOgxBIAHScPI6dVtkdpUp9hU ijFv8+W9SYKOWw7I1jujBvV9VC+bPcrtju2CMl381tEOqJEiWB1241OSCq5LFFE6 /EyyLW8cTONmY09mmPJozHMshAypKUcPuWICO3iWS+F057h5H6sDgNUCX/ohonnk H+x5by1atY2Q013Crbyr/bJ+Gdp3aaULLaAOKPgd+98DeSCSl+trbbkNwXtj56Tb HqKz2ECOH49VsEUjlxYGiNTV3XraRWWEcAKmlwGsyFQbU2A+T8hBBXhGMHhQv8+f OE/kOH7nE9mTXM2k2XTKn8uZvMDUKipM/A4tFwg3l47GELZ/HjF6I0pYF5fy1bUR HHzaYbL+Q2LZR2Zyka0x4vtqeY4fXyTrM7/8umN5yzdtwkPUpTArFj2ATPB3ZtKH tlfwpd+WA90xT0/34ToRXyMneSiE0siLLr0xRAHTfbX/OpXipT7amSLwhA9xtqNK CclPFA20ediujwvVxY3Wd+Ch/LC9uyeAJfp08FPZHbIorMKhSmGtVzWBIS3XtF+7 N5NOXZ5kZo8kmC+9kr0bTutifb5QY+IuLZyUdkQPoj9+oYVJOy612g8CPCSWzzO/ 8ANLdd053bc=rS+e -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 8.0) - noarch, ppc64le, x86_64
- Bugs fixed (https://bugzilla.redhat.com/):
1747448 - CVE-2019-14824 389-ds-base: Read permission check bypass via the deref plugin
-
8) - aarch64, noarch, ppc64le, s390x, x86_64
The following packages have been upgraded to a later upstream version: 389-ds-base (1.4.1.3). Bugs fixed (https://bugzilla.redhat.com/):
1591480 - CVE-2018-10871 389-ds-base: replication and the Retro Changelog plugin store plaintext password by default 1654056 - /usr/lib/systemd/system/dirsrv@.service:40: .include directives are deprecated 1654059 - CVE-2019-10224 389-ds-base: using dscreate in verbose mode results in information disclosure [rhel-8] 1677147 - CVE-2019-10224 389-ds-base: using dscreate in verbose mode results in information disclosure 1678517 - ipa role-mod DatabaseError changing cn 1693612 - CVE-2019-3883 389-ds-base: DoS via hanging secured connections 1702024 - Cannot create Directory Server's instances using dscreate 1706224 - Protocol setting is inconsistent in FIPS mode 1712467 - Rebase 389-ds-base on RHEL 8.1 1715675 - Fix potential ipv6 issues 1717540 - Address covscan warnings 1720331 - Log the actual base DN when the search fails with "invalid attribute request". 1725815 - consistency in the replication error codes while setting nsds5replicaid=65535 1729069 - IPA upgrade fails for latest ipa package when setup in multi master mode 1739183 - CleanAllRUV task limit not enforced 1747448 - CVE-2019-14824 389-ds-base: Read permission check bypass via the deref plugin
6
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1016", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "linux", scope: "eq", trust: 1, vendor: "debian", version: "8.0", }, { model: "389 directory server", scope: "eq", trust: 1, vendor: "fedoraproject", version: null, }, { model: "enterprise linux", scope: "eq", trust: 1, vendor: "redhat", version: "7.0", }, { model: "389 directory server", scope: null, trust: 0.8, vendor: "fedora", version: null, }, { model: "enterprise linux", scope: null, trust: 0.8, vendor: "red hat", version: null, }, { model: "hat directory server", scope: "eq", trust: 0.6, vendor: "red", version: "389", }, ], sources: [ { db: "CNVD", id: "CNVD-2019-40300", }, { db: "JVNDB", id: "JVNDB-2019-011844", }, { db: "NVD", id: "CVE-2019-14824", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { cpe_match: [ { cpe22Uri: "cpe:/a:fedoraproject:389_directory_server", vulnerable: true, }, { cpe22Uri: "cpe:/o:redhat:enterprise_linux", vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "JVNDB", id: "JVNDB-2019-011844", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Red Hat", sources: [ { db: "PACKETSTORM", id: "155470", }, { db: "PACKETSTORM", id: "156280", }, { db: "PACKETSTORM", id: "155127", }, { db: "CNNVD", id: "CNNVD-201911-089", }, ], trust: 0.9, }, cve: "CVE-2019-14824", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", author: "nvd@nist.gov", availabilityImpact: "NONE", baseScore: 3.5, confidentialityImpact: "PARTIAL", exploitabilityScore: 6.8, id: "CVE-2019-14824", impactScore: 2.9, integrityImpact: "NONE", severity: "LOW", trust: 1.8, vectorString: "AV:N/AC:M/Au:S/C:P/I:N/A:N", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "CNVD", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", exploitabilityScore: 10, id: "CNVD-2019-40300", impactScore: 2.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 0.6, vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "secalert@redhat.com", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", exploitabilityScore: 2.8, id: "CVE-2019-14824", impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", trust: 1.8, userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, { attackComplexity: "LOW", attackVector: "NETWORK", author: "nvd@nist.gov", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", exploitabilityScore: 2.8, id: "CVE-2019-14824", impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, ], severity: [ { author: "nvd@nist.gov", id: "CVE-2019-14824", trust: 1, value: "MEDIUM", }, { author: "secalert@redhat.com", id: "CVE-2019-14824", trust: 1, value: "MEDIUM", }, { author: "NVD", id: "CVE-2019-14824", trust: 0.8, value: "Medium", }, { author: "CNVD", id: "CNVD-2019-40300", trust: 0.6, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-201911-089", trust: 0.6, value: "MEDIUM", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2019-40300", }, { db: "JVNDB", id: "JVNDB-2019-011844", }, { db: "CNNVD", id: "CNNVD-201911-089", }, { db: "NVD", id: "CVE-2019-14824", }, { db: "NVD", id: "CVE-2019-14824", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "A flaw was found in the 'deref' plugin of 389-ds-base where it could use the 'search' permission to display attribute values. In some configurations, this could allow an authenticated attacker to view private attributes, such as password hashes. 389-ds-base Contains a vulnerability in the use of freed memory.Information may be obtained. Red Hat 389 Directory Server (formerly known as Fedora Directory Server) is an enterprise-class Linux directory server from Red Hat. The server fully supports the LDAPv3 specification and features scalable, multi-master replication. Deref is one of the deref plugins. \n\nThe deref plugin in Red Hat 389 Directory Server has a permission check bypass vulnerability that an attacker can use to view private properties. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: 389-ds-base security and bug fix update\nAdvisory ID: RHSA-2019:3981-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2019:3981\nIssue date: 2019-11-26\nCVE Names: CVE-2019-14824\n====================================================================\n1. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\n\n3. The\nbase packages include the Lightweight Directory Access Protocol (LDAP)\nserver and command-line utilities for server administration. \n\nSecurity Fix(es):\n\n* 389-ds-base: Read permission check bypass via the deref plugin\n(CVE-2019-14824)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nBug Fix(es):\n\n* DB Deadlock on modrdn appears to corrupt database and entry cache\n(BZ#1749289)\n\n* After audit log file is rotated, DS version string is logged after each\nupdate (BZ#1754831)\n\n* Extremely slow LDIF import with ldif2db (BZ#1763622)\n\n* ns-slapd crash on concurrent SASL BINDs,\nconnection_call_io_layer_callbacks must hold hold c_mutex (BZ#1763627)\n\n* CleanAllRUV task limit not enforced (BZ#1767622)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the 389 server service will be restarted\nautomatically. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1747448 - CVE-2019-14824 389-ds-base: Read permission check bypass via the deref plugin\n1749289 - DB Deadlock on modrdn appears to corrupt database and entry cache [rhel-7.7.z]\n1754831 - After audit log file is rotated, DS version string is logged after each update [rhel-7.7.z]\n1763622 - Extremely slow LDIF import with ldif2db [rhel-7.7.z]\n1763627 - ns-slapd crash on concurrent SASL BINDs, connection_call_io_layer_callbacks must hold hold c_mutex [rhel-7.7.z]\n1767622 - CleanAllRUV task limit not enforced [rhel-7.7.z]\n\n6. 7):\n\nSource:\n389-ds-base-1.3.9.1-12.el7_7.src.rpm\n\nppc64:\n389-ds-base-1.3.9.1-12.el7_7.ppc64.rpm\n389-ds-base-debuginfo-1.3.9.1-12.el7_7.ppc64.rpm\n389-ds-base-devel-1.3.9.1-12.el7_7.ppc64.rpm\n389-ds-base-libs-1.3.9.1-12.el7_7.ppc64.rpm\n389-ds-base-snmp-1.3.9.1-12.el7_7.ppc64.rpm\n\nppc64le:\n389-ds-base-debuginfo-1.3.9.1-12.el7_7.ppc64le.rpm\n389-ds-base-devel-1.3.9.1-12.el7_7.ppc64le.rpm\n389-ds-base-snmp-1.3.9.1-12.el7_7.ppc64le.rpm\n\ns390x:\n389-ds-base-1.3.9.1-12.el7_7.s390x.rpm\n389-ds-base-debuginfo-1.3.9.1-12.el7_7.s390x.rpm\n389-ds-base-devel-1.3.9.1-12.el7_7.s390x.rpm\n389-ds-base-libs-1.3.9.1-12.el7_7.s390x.rpm\n389-ds-base-snmp-1.3.9.1-12.el7_7.s390x.rpm\n\nx86_64:\n389-ds-base-debuginfo-1.3.9.1-12.el7_7.x86_64.rpm\n389-ds-base-devel-1.3.9.1-12.el7_7.x86_64.rpm\n389-ds-base-snmp-1.3.9.1-12.el7_7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nx86_64:\n389-ds-base-debuginfo-1.3.9.1-12.el7_7.x86_64.rpm\n389-ds-base-devel-1.3.9.1-12.el7_7.x86_64.rpm\n389-ds-base-snmp-1.3.9.1-12.el7_7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2019-14824\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2019 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\n8ANLdd053bc=rS+e\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. 8.0) - noarch, ppc64le, x86_64\n\n3. Bugs fixed (https://bugzilla.redhat.com/):\n\n1747448 - CVE-2019-14824 389-ds-base: Read permission check bypass via the deref plugin\n\n6. 8) - aarch64, noarch, ppc64le, s390x, x86_64\n\n3. \n\nThe following packages have been upgraded to a later upstream version:\n389-ds-base (1.4.1.3). Bugs fixed (https://bugzilla.redhat.com/):\n\n1591480 - CVE-2018-10871 389-ds-base: replication and the Retro Changelog plugin store plaintext password by default\n1654056 - /usr/lib/systemd/system/dirsrv@.service:40: .include directives are deprecated\n1654059 - CVE-2019-10224 389-ds-base: using dscreate in verbose mode results in information disclosure [rhel-8]\n1677147 - CVE-2019-10224 389-ds-base: using dscreate in verbose mode results in information disclosure\n1678517 - ipa role-mod DatabaseError changing cn\n1693612 - CVE-2019-3883 389-ds-base: DoS via hanging secured connections\n1702024 - Cannot create Directory Server's instances using dscreate\n1706224 - Protocol setting is inconsistent in FIPS mode\n1712467 - Rebase 389-ds-base on RHEL 8.1\n1715675 - Fix potential ipv6 issues\n1717540 - Address covscan warnings\n1720331 - Log the actual base DN when the search fails with \"invalid attribute request\". \n1725815 - consistency in the replication error codes while setting nsds5replicaid=65535\n1729069 - IPA upgrade fails for latest ipa package when setup in multi master mode\n1739183 - CleanAllRUV task limit not enforced\n1747448 - CVE-2019-14824 389-ds-base: Read permission check bypass via the deref plugin\n\n6", sources: [ { db: "NVD", id: "CVE-2019-14824", }, { db: "JVNDB", id: "JVNDB-2019-011844", }, { db: "CNVD", id: "CNVD-2019-40300", }, { db: "PACKETSTORM", id: "155470", }, { db: "PACKETSTORM", id: "156280", }, { db: "PACKETSTORM", id: "155127", }, ], trust: 2.43, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2019-14824", trust: 3.3, }, { db: "JVNDB", id: "JVNDB-2019-011844", trust: 0.8, }, { db: "PACKETSTORM", id: "155470", trust: 0.7, }, { db: "PACKETSTORM", id: "156280", trust: 0.7, }, { db: "CNVD", id: "CNVD-2019-40300", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2020.0474", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2019.4108", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2019.4488", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2019.4521", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2023.2312", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-201911-089", trust: 0.6, }, { db: "PACKETSTORM", id: "155127", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2019-40300", }, { db: "JVNDB", id: "JVNDB-2019-011844", }, { db: "PACKETSTORM", id: "155470", }, { db: "PACKETSTORM", id: "156280", }, { db: "PACKETSTORM", id: "155127", }, { db: "CNNVD", id: "CNNVD-201911-089", }, { db: "NVD", id: "CVE-2019-14824", }, ], }, id: "VAR-201911-1016", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2019-40300", }, ], trust: 0.06, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2019-40300", }, ], }, last_update_date: "2024-11-23T20:52:09.436000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "Top Page", trust: 0.8, url: "https://directory.fedoraproject.org/", }, { title: "Bug 1747448", trust: 0.8, url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14824", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2019-011844", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-732", trust: 1, }, { problemtype: "CWE-416", trust: 0.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2019-011844", }, { db: "NVD", id: "CVE-2019-14824", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2.3, url: "https://access.redhat.com/errata/rhsa-2019:3981", }, { trust: 2.3, url: "https://access.redhat.com/errata/rhsa-2020:0464", }, { trust: 2.2, url: "https://lists.debian.org/debian-lts-announce/2019/11/msg00036.html", }, { trust: 2.1, url: "https://access.redhat.com/security/cve/cve-2019-14824", }, { trust: 1.7, url: "https://nvd.nist.gov/vuln/detail/cve-2019-14824", }, { trust: 1.6, url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html", }, { trust: 1.6, url: "https://bugzilla.redhat.com/show_bug.cgi?id=cve-2019-14824", }, { trust: 1.3, url: "https://access.redhat.com/errata/rhsa-2019:3401", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-14824", }, { trust: 0.6, url: "https://access.redhat.com/errata/rhsa-2019", }, { trust: 0.6, url: "https://bugzilla.redhat.com/show_bug.cgi?id=1747448", }, { trust: 0.6, url: "https://pagure.io/389-ds-base/issue/50716", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2020.0474/", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2019.4108/", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/155470/red-hat-security-advisory-2019-3981-01.html", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2023.2312", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2019.4488/", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2019.4521/", }, { trust: 0.6, url: "https://vigilance.fr/vulnerability/389-directory-server-information-disclosure-via-deref-plugin-30987", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/156280/red-hat-security-advisory-2020-0464-01.html", }, { trust: 0.3, url: "https://www.redhat.com/mailman/listinfo/rhsa-announce", }, { trust: 0.3, url: "https://bugzilla.redhat.com/):", }, { trust: 0.3, url: "https://access.redhat.com/security/team/key/", }, { trust: 0.3, url: "https://access.redhat.com/articles/11258", }, { trust: 0.3, url: "https://access.redhat.com/security/team/contact/", }, { trust: 0.3, url: "https://access.redhat.com/security/updates/classification/#important", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-3883", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2019-10224", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-10224", }, { trust: 0.1, url: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.1_release_notes/", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2018-10871", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2019-3883", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2018-10871", }, ], sources: [ { db: "CNVD", id: "CNVD-2019-40300", }, { db: "JVNDB", id: "JVNDB-2019-011844", }, { db: "PACKETSTORM", id: "155470", }, { db: "PACKETSTORM", id: "156280", }, { db: "PACKETSTORM", id: "155127", }, { db: "CNNVD", id: "CNNVD-201911-089", }, { db: "NVD", id: "CVE-2019-14824", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2019-40300", }, { db: "JVNDB", id: "JVNDB-2019-011844", }, { db: "PACKETSTORM", id: "155470", }, { db: "PACKETSTORM", id: "156280", }, { db: "PACKETSTORM", id: "155127", }, { db: "CNNVD", id: "CNNVD-201911-089", }, { db: "NVD", id: "CVE-2019-14824", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2019-11-13T00:00:00", db: "CNVD", id: "CNVD-2019-40300", }, { date: "2019-11-19T00:00:00", db: "JVNDB", id: "JVNDB-2019-011844", }, { date: "2019-11-26T17:22:54", db: "PACKETSTORM", id: "155470", }, { date: "2020-02-10T21:03:06", db: "PACKETSTORM", id: "156280", }, { date: "2019-11-06T15:37:05", db: "PACKETSTORM", id: "155127", }, { date: "2019-11-04T00:00:00", db: "CNNVD", id: "CNNVD-201911-089", }, { date: "2019-11-08T15:15:11.563000", db: "NVD", id: "CVE-2019-14824", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2019-11-13T00:00:00", db: "CNVD", id: "CNVD-2019-40300", }, { date: "2019-11-19T00:00:00", db: "JVNDB", id: "JVNDB-2019-011844", }, { date: "2023-04-26T00:00:00", db: "CNNVD", id: "CNNVD-201911-089", }, { date: "2024-11-21T04:27:26.460000", db: "NVD", id: "CVE-2019-14824", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-201911-089", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "389-ds-base Uses freed memory vulnerability", sources: [ { db: "JVNDB", id: "JVNDB-2019-011844", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "resource management error", sources: [ { db: "CNNVD", id: "CNNVD-201911-089", }, ], trust: 0.6, }, }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.