- Issued:
- 2008-05-09
- Updated:
- 2008-05-09
RHSA-2008:0269 - Security Advisory
Synopsis
Critical: redhat-ds-base security update
Type/Severity
Security Advisory: Critical
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated redhat-ds-base package that fixes a security issue is now
available for Red Hat Directory Server 8.0.
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
Description
Red Hat Directory Server is an LDAPv3 compliant server. The redhat-ds-base
package includes the LDAP server and command line utilities for server
administration.
A buffer overflow flaw was found in the Red Hat Directory Server 8.0
regular expression handler. An unauthenticated attacker could construct a
malicious LDAP query that could cause the LDAP server to crash, or,
possibly, execute arbitrary code. (CVE-2008-1677)
All users of Red Hat Directory Server should upgrade to this updated
package, which resolves this issue.
Solution
Users running Red Hat Directory Server on Red Hat Enterprise Linux:
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Users running Red Hat Directory Server on Sun Solaris:
An updated Solaris packages in .pkg format are available in the Red Hat
Directory Server 8.0 Solaris channel on the Red Hat Network. This packages
should be installed/upgraded using Solaris native package management tools.
See also Red Hat Directory Server 8.0 Installation Guide for installation
instructions:
http://www.redhat.com/docs/manuals/dir-server/install/8.0/
Affected Products
- Red Hat Directory Server 8 x86_64
- Red Hat Directory Server 8 i386
Fixes
- BZ - 444712 - CVE-2008-1677 Directory Server: insufficient buffer size for search patterns
CVEs
Red Hat Directory Server 8
SRPM | |
---|---|
redhat-ds-base-8.0.3-16.el5dsrv.src.rpm | SHA-256: 529bd18981d18644ece8f41c0899c525ff773975901f370fe1b5a198feb4f1c2 |
x86_64 | |
redhat-ds-base-8.0.3-16.el5dsrv.x86_64.rpm | SHA-256: b0171e3a5afc14b5c1a99a99d30a19d438a2dcf5016bcf7459fa0acaf84f1b2f |
redhat-ds-base-devel-8.0.3-16.el5dsrv.x86_64.rpm | SHA-256: 763c054da923789c7ef571feb0f79fcda0432b0b169b6407e09ee9c100e73675 |
i386 | |
redhat-ds-base-8.0.3-16.el5dsrv.i386.rpm | SHA-256: 0c8559a1f010849be4917924f04fa919bb2af4314f6495411e5008e119340b3e |
redhat-ds-base-devel-8.0.3-16.el5dsrv.i386.rpm | SHA-256: e704d7cbc080eb8c4819a589ecca82346ab29fa13f965afaee5830c27cbfd4a1 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.