MGASA-2013-0263

Source
https://advisories.mageia.org/MGASA-2013-0263.html
Import Source
https://advisories.mageia.org/MGASA-2013-0263.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2013-0263
Related
Published
2013-08-30T17:23:22Z
Modified
2013-08-30T17:23:15Z
Summary
Updated 389-ds-base packag fixes security vulnerabilies and incorrect group usage
Details

Updated 389-ds-base packages fix security vulnerabilities:

It was discovered that the 389 Directory Server did not honor defined attribute access controls when evaluating search filter expressions. A remote attacker (with permission to query the Directory Server) could use this flaw to determine the values of restricted attributes via a series of search queries with filter conditions that used restricted attributes (CVE-2013-2219).

It was discovered that the 389 Directory Server did not properly handle the receipt of certain MOD operations with a bogus Distinguished Name (DN). A remote, unauthenticated attacker could use this flaw to cause the 389 Directory Server to crash (CVE-2013-4283).

Additionally, problems of wrong default group nobody (from upstream) as well as the 389-ds server not starting after a reboot have been fixed (mga#10138).

References
Credits

Affected packages

Mageia:3 / 389-ds-base

Package

Name
389-ds-base
Purl
pkg:rpm/mageia/389-ds-base?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.0.8-1.mga3

Ecosystem specific

{
    "section": "core"
}