Saturday, July 24, 2010

Red Hat Enterprise Linux : openldap security update vulnerability

Users of Red Hat Enterprise Linux please be advised of a openldap security update vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
RHSA-2010:0543-01: RHSA-2010:0543-01 Moderate: openldap security update
Red Hat Enterprise Linux
Description:



OpenLDAP is an open source suite of LDAP (Lightweight Directory Access

Protocol) applications and development tools.



An uninitialized pointer use flaw was discovered in the way the slapd

daemon handled modify relative distinguished name (modrdn) requests. An

authenticated user with privileges to perform modrdn operations could use

this flaw to crash the slapd daemon via specially-crafted modrdn requests.

(CVE-2010-0211)



Red Hat would like to thank CERT-FI for responsibly reporting the

CVE-2010-0211 flaw, who credit Ilkka Mattila and Tuomas Salomki for the

discovery of the issue.



A flaw was found in the way OpenLDAP handled NUL characters in the

CommonName field of X.509 certificates. An attacker able to get a

carefully-crafted certificate signed by a trusted Certificate Authority

could trick applications using OpenLDAP libraries into accepting it by

mistake, allowing the attacker to perform a man-in-the-middle attack.

(CVE-2009-3767)



Users of OpenLDAP should upgrade to these updated packages, which contain

backported patches to resolve these issues. After installing this update,

the OpenLDAP daemons will be restarted automatically.
Read more at www.criticalwatch.com
 

No comments:

Post a Comment