MGASA-2014-0333

Source
https://advisories.mageia.org/MGASA-2014-0333.html
Import Source
https://advisories.mageia.org/MGASA-2014-0333.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2014-0333
Related
Published
2014-08-18T09:14:56Z
Modified
2014-08-18T08:57:20Z
Summary
Updated 389-ds-base packages fix security vulnerability
Details

It was found that when replication was enabled for each attribute in 389 Directory Server, which is the default configuration, the server returned replicated metadata when the directory was searched while debugging was enabled. A remote attacker could use this flaw to disclose potentially sensitive information (CVE-2014-3562).

The 389-ds-base package has been updated to version 1.3.2.22, fixing this issue and other bugs.

References
Credits

Affected packages

Mageia:3 / 389-ds-base

Package

Name
389-ds-base
Purl
pkg:rpm/mageia/389-ds-base?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.2.22-1.mga3

Ecosystem specific

{
    "section": "core"
}

Mageia:4 / 389-ds-base

Package

Name
389-ds-base
Purl
pkg:rpm/mageia/389-ds-base?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.2.22-1.mga4

Ecosystem specific

{
    "section": "core"
}