(IBM Issues Fix for IBM Security Access Manager) OpenLDAP Bug in ber_get_next() Lets Remote Users Cause the Target Service to Crash
|
SecurityTracker Alert ID: 1041400 |
SecurityTracker URL: http://securitytracker.com/id/1041400
|
CVE Reference:
CVE-2015-6908
(Links to External Site)
|
Date: Aug 1 2018
|
Impact:
Denial of service via network
|
Fix Available: Yes Vendor Confirmed: Yes Exploit Included: Yes
|
Version(s): 8.0.0, 8.0.0.1, 8.0.0.2, 8.0.0.3, 8.0.0.4, 8.0.0.5, 8.0.1, 8.0.1.2, 8.0.1.3, 8.0.1.4, 8.0.1.5, 8.0.1.6, 9.0.0, 9.0.0.1, 9.0.1.0, 9.0.2.0, 9.0.2.1
|
Description:
A vulnerability was reported in OpenLDAP. A remote user can cause the target service to crash. IBM Security Access Manager is affected.
A remote user can send a specially crafted packet to cause the target slapd service to crash.
A demonstration exploit command is provided:
echo "/4SEhISEd4MKYj5ZMgAAAC8=" | base64 -d | nc -v [target] 389
The original advisory is available at:
http://www.security-assessment.com/files/documents/advisory/OpenLDAP-ber_get_next-Denial-of-Service.pdf
Denis Andzakovic of Security-Assessment.com reported this vulnerability.
|
Impact:
A remote user can cause the target LDAP service to crash.
|
Solution:
IBM has issued a fix for IBM Security Access Manager (APAR IJ00151).
The IBM advisory is available at:
https://www-01.ibm.com/support/docview.wss?uid=swg22009241
|
Vendor URL: www-01.ibm.com/support/docview.wss?uid=swg22009241 (Links to External Site)
|
Cause:
Input validation error
|
Underlying OS: Linux (Red Hat Enterprise), Linux (SuSE), UNIX (AIX), UNIX (Solaris - SunOS), Windows (2000), Windows (2003)
|
|
Message History:
This archive entry is a follow-up to the message listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|