var-201911-1016
Vulnerability from variot
A flaw was found in the 'deref' plugin of 389-ds-base where it could use the 'search' permission to display attribute values. In some configurations, this could allow an authenticated attacker to view private attributes, such as password hashes. 389-ds-base Contains a vulnerability in the use of freed memory.Information may be obtained. Red Hat 389 Directory Server (formerly known as Fedora Directory Server) is an enterprise-class Linux directory server from Red Hat. The server fully supports the LDAPv3 specification and features scalable, multi-master replication. Deref is one of the deref plugins.
The deref plugin in Red Hat 389 Directory Server has a permission check bypass vulnerability that an attacker can use to view private properties. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: 389-ds-base security and bug fix update Advisory ID: RHSA-2019:3981-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:3981 Issue date: 2019-11-26 CVE Names: CVE-2019-14824 ==================================================================== 1.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
-
7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64
-
The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.
Security Fix(es):
- 389-ds-base: Read permission check bypass via the deref plugin (CVE-2019-14824)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
-
DB Deadlock on modrdn appears to corrupt database and entry cache (BZ#1749289)
-
After audit log file is rotated, DS version string is logged after each update (BZ#1754831)
-
Extremely slow LDIF import with ldif2db (BZ#1763622)
-
ns-slapd crash on concurrent SASL BINDs, connection_call_io_layer_callbacks must hold hold c_mutex (BZ#1763627)
-
CleanAllRUV task limit not enforced (BZ#1767622)
-
Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing this update, the 389 server service will be restarted automatically.
- Bugs fixed (https://bugzilla.redhat.com/):
1747448 - CVE-2019-14824 389-ds-base: Read permission check bypass via the deref plugin 1749289 - DB Deadlock on modrdn appears to corrupt database and entry cache [rhel-7.7.z] 1754831 - After audit log file is rotated, DS version string is logged after each update [rhel-7.7.z] 1763622 - Extremely slow LDIF import with ldif2db [rhel-7.7.z] 1763627 - ns-slapd crash on concurrent SASL BINDs, connection_call_io_layer_callbacks must hold hold c_mutex [rhel-7.7.z] 1767622 - CleanAllRUV task limit not enforced [rhel-7.7.z]
- 7):
Source: 389-ds-base-1.3.9.1-12.el7_7.src.rpm
ppc64: 389-ds-base-1.3.9.1-12.el7_7.ppc64.rpm 389-ds-base-debuginfo-1.3.9.1-12.el7_7.ppc64.rpm 389-ds-base-devel-1.3.9.1-12.el7_7.ppc64.rpm 389-ds-base-libs-1.3.9.1-12.el7_7.ppc64.rpm 389-ds-base-snmp-1.3.9.1-12.el7_7.ppc64.rpm
ppc64le: 389-ds-base-debuginfo-1.3.9.1-12.el7_7.ppc64le.rpm 389-ds-base-devel-1.3.9.1-12.el7_7.ppc64le.rpm 389-ds-base-snmp-1.3.9.1-12.el7_7.ppc64le.rpm
s390x: 389-ds-base-1.3.9.1-12.el7_7.s390x.rpm 389-ds-base-debuginfo-1.3.9.1-12.el7_7.s390x.rpm 389-ds-base-devel-1.3.9.1-12.el7_7.s390x.rpm 389-ds-base-libs-1.3.9.1-12.el7_7.s390x.rpm 389-ds-base-snmp-1.3.9.1-12.el7_7.s390x.rpm
x86_64: 389-ds-base-debuginfo-1.3.9.1-12.el7_7.x86_64.rpm 389-ds-base-devel-1.3.9.1-12.el7_7.x86_64.rpm 389-ds-base-snmp-1.3.9.1-12.el7_7.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
x86_64: 389-ds-base-debuginfo-1.3.9.1-12.el7_7.x86_64.rpm 389-ds-base-devel-1.3.9.1-12.el7_7.x86_64.rpm 389-ds-base-snmp-1.3.9.1-12.el7_7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2019-14824 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBXd0wD9zjgjWX9erEAQgHUg/+N9VdnQDmeRiQopeSvr69XIUMytjLbwk1 qzX1z2FUIjJCHOFrxGq43aellPmu2K+opzhvrcpSaOgxBIAHScPI6dVtkdpUp9hU ijFv8+W9SYKOWw7I1jujBvV9VC+bPcrtju2CMl381tEOqJEiWB1241OSCq5LFFE6 /EyyLW8cTONmY09mmPJozHMshAypKUcPuWICO3iWS+F057h5H6sDgNUCX/ohonnk H+x5by1atY2Q013Crbyr/bJ+Gdp3aaULLaAOKPgd+98DeSCSl+trbbkNwXtj56Tb HqKz2ECOH49VsEUjlxYGiNTV3XraRWWEcAKmlwGsyFQbU2A+T8hBBXhGMHhQv8+f OE/kOH7nE9mTXM2k2XTKn8uZvMDUKipM/A4tFwg3l47GELZ/HjF6I0pYF5fy1bUR HHzaYbL+Q2LZR2Zyka0x4vtqeY4fXyTrM7/8umN5yzdtwkPUpTArFj2ATPB3ZtKH tlfwpd+WA90xT0/34ToRXyMneSiE0siLLr0xRAHTfbX/OpXipT7amSLwhA9xtqNK CclPFA20ediujwvVxY3Wd+Ch/LC9uyeAJfp08FPZHbIorMKhSmGtVzWBIS3XtF+7 N5NOXZ5kZo8kmC+9kr0bTutifb5QY+IuLZyUdkQPoj9+oYVJOy612g8CPCSWzzO/ 8ANLdd053bc=rS+e -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 8.0) - noarch, ppc64le, x86_64
- Bugs fixed (https://bugzilla.redhat.com/):
1747448 - CVE-2019-14824 389-ds-base: Read permission check bypass via the deref plugin
-
8) - aarch64, noarch, ppc64le, s390x, x86_64
The following packages have been upgraded to a later upstream version: 389-ds-base (1.4.1.3). Bugs fixed (https://bugzilla.redhat.com/):
1591480 - CVE-2018-10871 389-ds-base: replication and the Retro Changelog plugin store plaintext password by default 1654056 - /usr/lib/systemd/system/dirsrv@.service:40: .include directives are deprecated 1654059 - CVE-2019-10224 389-ds-base: using dscreate in verbose mode results in information disclosure [rhel-8] 1677147 - CVE-2019-10224 389-ds-base: using dscreate in verbose mode results in information disclosure 1678517 - ipa role-mod DatabaseError changing cn 1693612 - CVE-2019-3883 389-ds-base: DoS via hanging secured connections 1702024 - Cannot create Directory Server's instances using dscreate 1706224 - Protocol setting is inconsistent in FIPS mode 1712467 - Rebase 389-ds-base on RHEL 8.1 1715675 - Fix potential ipv6 issues 1717540 - Address covscan warnings 1720331 - Log the actual base DN when the search fails with "invalid attribute request". 1725815 - consistency in the replication error codes while setting nsds5replicaid=65535 1729069 - IPA upgrade fails for latest ipa package when setup in multi master mode 1739183 - CleanAllRUV task limit not enforced 1747448 - CVE-2019-14824 389-ds-base: Read permission check bypass via the deref plugin
6
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1016", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "8.0" }, { "model": "389 directory server", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": null }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "389 directory server", "scope": null, "trust": 0.8, "vendor": "fedora", "version": null }, { "model": "enterprise linux", "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": "hat directory server", "scope": "eq", "trust": 0.6, "vendor": "red", "version": "389" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-40300" }, { "db": "JVNDB", "id": "JVNDB-2019-011844" }, { "db": "NVD", "id": "CVE-2019-14824" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:fedoraproject:389_directory_server", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011844" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "155470" }, { "db": "PACKETSTORM", "id": "156280" }, { "db": "PACKETSTORM", "id": "155127" }, { "db": "CNNVD", "id": "CNNVD-201911-089" } ], "trust": 0.9 }, "cve": "CVE-2019-14824", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.8, "id": "CVE-2019-14824", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2019-40300", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "secalert@redhat.com", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2019-14824", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2019-14824", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-14824", "trust": 1.0, "value": "MEDIUM" }, { "author": "secalert@redhat.com", "id": "CVE-2019-14824", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2019-14824", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2019-40300", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201911-089", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-40300" }, { "db": "JVNDB", "id": "JVNDB-2019-011844" }, { "db": "CNNVD", "id": "CNNVD-201911-089" }, { "db": "NVD", "id": "CVE-2019-14824" }, { "db": "NVD", "id": "CVE-2019-14824" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A flaw was found in the \u0027deref\u0027 plugin of 389-ds-base where it could use the \u0027search\u0027 permission to display attribute values. In some configurations, this could allow an authenticated attacker to view private attributes, such as password hashes. 389-ds-base Contains a vulnerability in the use of freed memory.Information may be obtained. Red Hat 389 Directory Server (formerly known as Fedora Directory Server) is an enterprise-class Linux directory server from Red Hat. The server fully supports the LDAPv3 specification and features scalable, multi-master replication. Deref is one of the deref plugins. \n\nThe deref plugin in Red Hat 389 Directory Server has a permission check bypass vulnerability that an attacker can use to view private properties. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: 389-ds-base security and bug fix update\nAdvisory ID: RHSA-2019:3981-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2019:3981\nIssue date: 2019-11-26\nCVE Names: CVE-2019-14824\n====================================================================\n1. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\n\n3. The\nbase packages include the Lightweight Directory Access Protocol (LDAP)\nserver and command-line utilities for server administration. \n\nSecurity Fix(es):\n\n* 389-ds-base: Read permission check bypass via the deref plugin\n(CVE-2019-14824)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nBug Fix(es):\n\n* DB Deadlock on modrdn appears to corrupt database and entry cache\n(BZ#1749289)\n\n* After audit log file is rotated, DS version string is logged after each\nupdate (BZ#1754831)\n\n* Extremely slow LDIF import with ldif2db (BZ#1763622)\n\n* ns-slapd crash on concurrent SASL BINDs,\nconnection_call_io_layer_callbacks must hold hold c_mutex (BZ#1763627)\n\n* CleanAllRUV task limit not enforced (BZ#1767622)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the 389 server service will be restarted\nautomatically. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1747448 - CVE-2019-14824 389-ds-base: Read permission check bypass via the deref plugin\n1749289 - DB Deadlock on modrdn appears to corrupt database and entry cache [rhel-7.7.z]\n1754831 - After audit log file is rotated, DS version string is logged after each update [rhel-7.7.z]\n1763622 - Extremely slow LDIF import with ldif2db [rhel-7.7.z]\n1763627 - ns-slapd crash on concurrent SASL BINDs, connection_call_io_layer_callbacks must hold hold c_mutex [rhel-7.7.z]\n1767622 - CleanAllRUV task limit not enforced [rhel-7.7.z]\n\n6. 7):\n\nSource:\n389-ds-base-1.3.9.1-12.el7_7.src.rpm\n\nppc64:\n389-ds-base-1.3.9.1-12.el7_7.ppc64.rpm\n389-ds-base-debuginfo-1.3.9.1-12.el7_7.ppc64.rpm\n389-ds-base-devel-1.3.9.1-12.el7_7.ppc64.rpm\n389-ds-base-libs-1.3.9.1-12.el7_7.ppc64.rpm\n389-ds-base-snmp-1.3.9.1-12.el7_7.ppc64.rpm\n\nppc64le:\n389-ds-base-debuginfo-1.3.9.1-12.el7_7.ppc64le.rpm\n389-ds-base-devel-1.3.9.1-12.el7_7.ppc64le.rpm\n389-ds-base-snmp-1.3.9.1-12.el7_7.ppc64le.rpm\n\ns390x:\n389-ds-base-1.3.9.1-12.el7_7.s390x.rpm\n389-ds-base-debuginfo-1.3.9.1-12.el7_7.s390x.rpm\n389-ds-base-devel-1.3.9.1-12.el7_7.s390x.rpm\n389-ds-base-libs-1.3.9.1-12.el7_7.s390x.rpm\n389-ds-base-snmp-1.3.9.1-12.el7_7.s390x.rpm\n\nx86_64:\n389-ds-base-debuginfo-1.3.9.1-12.el7_7.x86_64.rpm\n389-ds-base-devel-1.3.9.1-12.el7_7.x86_64.rpm\n389-ds-base-snmp-1.3.9.1-12.el7_7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nx86_64:\n389-ds-base-debuginfo-1.3.9.1-12.el7_7.x86_64.rpm\n389-ds-base-devel-1.3.9.1-12.el7_7.x86_64.rpm\n389-ds-base-snmp-1.3.9.1-12.el7_7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2019-14824\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2019 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\n8ANLdd053bc=rS+e\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. 8.0) - noarch, ppc64le, x86_64\n\n3. Bugs fixed (https://bugzilla.redhat.com/):\n\n1747448 - CVE-2019-14824 389-ds-base: Read permission check bypass via the deref plugin\n\n6. 8) - aarch64, noarch, ppc64le, s390x, x86_64\n\n3. \n\nThe following packages have been upgraded to a later upstream version:\n389-ds-base (1.4.1.3). Bugs fixed (https://bugzilla.redhat.com/):\n\n1591480 - CVE-2018-10871 389-ds-base: replication and the Retro Changelog plugin store plaintext password by default\n1654056 - /usr/lib/systemd/system/dirsrv@.service:40: .include directives are deprecated\n1654059 - CVE-2019-10224 389-ds-base: using dscreate in verbose mode results in information disclosure [rhel-8]\n1677147 - CVE-2019-10224 389-ds-base: using dscreate in verbose mode results in information disclosure\n1678517 - ipa role-mod DatabaseError changing cn\n1693612 - CVE-2019-3883 389-ds-base: DoS via hanging secured connections\n1702024 - Cannot create Directory Server\u0027s instances using dscreate\n1706224 - Protocol setting is inconsistent in FIPS mode\n1712467 - Rebase 389-ds-base on RHEL 8.1\n1715675 - Fix potential ipv6 issues\n1717540 - Address covscan warnings\n1720331 - Log the actual base DN when the search fails with \"invalid attribute request\". \n1725815 - consistency in the replication error codes while setting nsds5replicaid=65535\n1729069 - IPA upgrade fails for latest ipa package when setup in multi master mode\n1739183 - CleanAllRUV task limit not enforced\n1747448 - CVE-2019-14824 389-ds-base: Read permission check bypass via the deref plugin\n\n6", "sources": [ { "db": "NVD", "id": "CVE-2019-14824" }, { "db": "JVNDB", "id": "JVNDB-2019-011844" }, { "db": "CNVD", "id": "CNVD-2019-40300" }, { "db": "PACKETSTORM", "id": "155470" }, { "db": "PACKETSTORM", "id": "156280" }, { "db": "PACKETSTORM", "id": "155127" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-14824", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2019-011844", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "155470", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "156280", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2019-40300", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0474", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4108", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4488", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4521", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2023.2312", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201911-089", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "155127", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-40300" }, { "db": "JVNDB", "id": "JVNDB-2019-011844" }, { "db": "PACKETSTORM", "id": "155470" }, { "db": "PACKETSTORM", "id": "156280" }, { "db": "PACKETSTORM", "id": "155127" }, { "db": "CNNVD", "id": "CNNVD-201911-089" }, { "db": "NVD", "id": "CVE-2019-14824" } ] }, "id": "VAR-201911-1016", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-40300" } ], "trust": 0.06 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-40300" } ] }, "last_update_date": "2024-11-23T20:52:09.436000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://directory.fedoraproject.org/" }, { "title": "Bug 1747448", "trust": 0.8, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14824" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011844" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-732", "trust": 1.0 }, { "problemtype": "CWE-416", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011844" }, { "db": "NVD", "id": "CVE-2019-14824" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://access.redhat.com/errata/rhsa-2019:3981" }, { "trust": 2.3, "url": "https://access.redhat.com/errata/rhsa-2020:0464" }, { "trust": 2.2, "url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00036.html" }, { "trust": 2.1, "url": "https://access.redhat.com/security/cve/cve-2019-14824" }, { "trust": 1.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14824" }, { "trust": 1.6, "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html" }, { "trust": 1.6, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=cve-2019-14824" }, { "trust": 1.3, "url": "https://access.redhat.com/errata/rhsa-2019:3401" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-14824" }, { "trust": 0.6, "url": "https://access.redhat.com/errata/rhsa-2019" }, { "trust": 0.6, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1747448" }, { "trust": 0.6, "url": "https://pagure.io/389-ds-base/issue/50716" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0474/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4108/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/155470/red-hat-security-advisory-2019-3981-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2023.2312" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4488/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4521/" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/389-directory-server-information-disclosure-via-deref-plugin-30987" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/156280/red-hat-security-advisory-2020-0464-01.html" }, { "trust": 0.3, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.3, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.3, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3883" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-10224" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10224" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.1_release_notes/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-10871" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-3883" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10871" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-40300" }, { "db": "JVNDB", "id": "JVNDB-2019-011844" }, { "db": "PACKETSTORM", "id": "155470" }, { "db": "PACKETSTORM", "id": "156280" }, { "db": "PACKETSTORM", "id": "155127" }, { "db": "CNNVD", "id": "CNNVD-201911-089" }, { "db": "NVD", "id": "CVE-2019-14824" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-40300" }, { "db": "JVNDB", "id": "JVNDB-2019-011844" }, { "db": "PACKETSTORM", "id": "155470" }, { "db": "PACKETSTORM", "id": "156280" }, { "db": "PACKETSTORM", "id": "155127" }, { "db": "CNNVD", "id": "CNNVD-201911-089" }, { "db": "NVD", "id": "CVE-2019-14824" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-13T00:00:00", "db": "CNVD", "id": "CNVD-2019-40300" }, { "date": "2019-11-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011844" }, { "date": "2019-11-26T17:22:54", "db": "PACKETSTORM", "id": "155470" }, { "date": "2020-02-10T21:03:06", "db": "PACKETSTORM", "id": "156280" }, { "date": "2019-11-06T15:37:05", "db": "PACKETSTORM", "id": "155127" }, { "date": "2019-11-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-089" }, { "date": "2019-11-08T15:15:11.563000", "db": "NVD", "id": "CVE-2019-14824" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-13T00:00:00", "db": "CNVD", "id": "CNVD-2019-40300" }, { "date": "2019-11-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011844" }, { "date": "2023-04-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-089" }, { "date": "2024-11-21T04:27:26.460000", "db": "NVD", "id": "CVE-2019-14824" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-089" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "389-ds-base Uses freed memory vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011844" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-089" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.