SB2024070940 - Red Hat Directory Server 11 update for the redhat-ds:11 module



SB2024070940 - Red Hat Directory Server 11 update for the redhat-ds:11 module

Published: July 9, 2024

Security Bulletin ID SB2024070940
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 67% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2024-3657)

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input when parsing Kerberos AS-REQ packets. A remote user can send specially crafted query to the LDAP server and perform a denial of service (DoS) attack.


2) Input validation error (CVE-ID: CVE-2024-2199)

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input when modifying "userPassword". A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.


3) Heap-based buffer overflow (CVE-ID: CVE-2024-1062)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error when writing a value larger than 256 chars in log_entry_attr. A local user can pass specially crafted data to the application, trigger a heap-based buffer overflow and perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.