SB2016012721 - OpenSUSE Linux update for openldap2 



SB2016012721 - OpenSUSE Linux update for openldap2

Published: January 27, 2016 Updated: November 8, 2022

Security Bulletin ID SB2016012721
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Man-in-the-middle attack (CVE-ID: CVE-2015-4000)

The vulnerability allows a remote attacker to decrypt TLS connections in certain situations.

The vulnerability exists due to boundary error when parsing HTTP requests. A remote unauthenticated attacker can conduct a man-in-the-middle attack that can lead to the target system to downgrade the Diffie-Hellman algorithm to 512-bit export-grade cryptography.

Successful exploitation of this vulnerability may result in modification of authentication information

2) Input validation error (CVE-ID: CVE-2015-6908)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The ber_get_next function in libraries/liblber/io.c in OpenLDAP 2.4.42 and earlier allows remote attackers to cause a denial of service (reachable assertion and application crash) via crafted BER data, as demonstrated by an attack against slapd.


Remediation

Install update from vendor's website.