rhsa-2016_0014
Vulnerability from csaf_redhat
Published
2016-01-08 09:13
Modified
2024-11-22 09:42
Summary
Red Hat Security Advisory: libldb security update
Notes
Topic
Updated libldb packages that fix two security issues are now available for
Red Hat Gluster Storage 3.1.
Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
The libldb packages provide an extensible library that implements an
LDAP-like API to access remote LDAP servers, or use local TDB databases.
A denial of service flaw was found in the ldb_wildcard_compare() function
of libldb. A remote attacker could send a specially crafted packet that,
when processed by an application using libldb (for example the AD LDAP
server in Samba), would cause that application to consume an excessive
amount of memory and crash. (CVE-2015-3223)
A memory-read flaw was found in the way the libldb library processed LDB DN
records with a null byte. An authenticated, remote attacker could use this
flaw to read heap-memory pages from the server. (CVE-2015-5330)
Red Hat would like to thank the Samba project for reporting these issues.
Upstream acknowledges Thilo Uttendorfer as the original reporter of
CVE-2015-3223, and Douglas Bagnall as the original reporter of
CVE-2015-5330.
All libldb users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated libldb packages that fix two security issues are now available for\nRed Hat Gluster Storage 3.1.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The libldb packages provide an extensible library that implements an\nLDAP-like API to access remote LDAP servers, or use local TDB databases.\n\nA denial of service flaw was found in the ldb_wildcard_compare() function\nof libldb. A remote attacker could send a specially crafted packet that,\nwhen processed by an application using libldb (for example the AD LDAP\nserver in Samba), would cause that application to consume an excessive\namount of memory and crash. (CVE-2015-3223)\n\nA memory-read flaw was found in the way the libldb library processed LDB DN\nrecords with a null byte. An authenticated, remote attacker could use this\nflaw to read heap-memory pages from the server. (CVE-2015-5330)\n\nRed Hat would like to thank the Samba project for reporting these issues.\nUpstream acknowledges Thilo Uttendorfer as the original reporter of\nCVE-2015-3223, and Douglas Bagnall as the original reporter of\nCVE-2015-5330.\n\nAll libldb users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0014", "url": "https://access.redhat.com/errata/RHSA-2016:0014" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1281326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1281326" }, { "category": "external", "summary": "1290287", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1290287" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0014.json" } ], "title": "Red Hat Security Advisory: libldb security update", "tracking": { "current_release_date": "2024-11-22T09:42:12+00:00", "generator": { "date": "2024-11-22T09:42:12+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:0014", "initial_release_date": "2016-01-08T09:13:42+00:00", "revision_history": [ { "date": "2016-01-08T09:13:42+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-01-08T09:13:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T09:42:12+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Gluster Storage Server 3.1 on RHEL-6", "product": { "name": "Red Hat Gluster Storage Server 3.1 on RHEL-6", "product_id": "6Server-RH-Gluster-3-Server", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3.1:server:el6" } } }, { "category": "product_name", "name": "Red Hat Gluster 3 Samba on RHEL-7", "product": { "name": "Red Hat Gluster 3 Samba on RHEL-7", "product_id": "7Server-RH-Gluster-3-Samba", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3.1:samba:el7" } } } ], "category": "product_family", "name": "Red Hat Gluster Storage" }, { "branches": [ { "category": "product_version", "name": "libldb-0:1.1.20-3.el6rhs.x86_64", "product": { "name": "libldb-0:1.1.20-3.el6rhs.x86_64", "product_id": "libldb-0:1.1.20-3.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libldb@1.1.20-3.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "libldb-devel-0:1.1.20-3.el6rhs.x86_64", "product": { "name": "libldb-devel-0:1.1.20-3.el6rhs.x86_64", "product_id": "libldb-devel-0:1.1.20-3.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libldb-devel@1.1.20-3.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "libldb-debuginfo-0:1.1.20-3.el6rhs.x86_64", "product": { "name": "libldb-debuginfo-0:1.1.20-3.el6rhs.x86_64", "product_id": "libldb-debuginfo-0:1.1.20-3.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libldb-debuginfo@1.1.20-3.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "ldb-tools-0:1.1.20-3.el6rhs.x86_64", "product": { "name": "ldb-tools-0:1.1.20-3.el6rhs.x86_64", "product_id": "ldb-tools-0:1.1.20-3.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ldb-tools@1.1.20-3.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "pyldb-0:1.1.20-3.el6rhs.x86_64", "product": { "name": "pyldb-0:1.1.20-3.el6rhs.x86_64", "product_id": "pyldb-0:1.1.20-3.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pyldb@1.1.20-3.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "pyldb-devel-0:1.1.20-3.el6rhs.x86_64", "product": { "name": "pyldb-devel-0:1.1.20-3.el6rhs.x86_64", "product_id": "pyldb-devel-0:1.1.20-3.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pyldb-devel@1.1.20-3.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "libldb-devel-0:1.1.20-3.el7rhgs.x86_64", "product": { "name": "libldb-devel-0:1.1.20-3.el7rhgs.x86_64", "product_id": "libldb-devel-0:1.1.20-3.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libldb-devel@1.1.20-3.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "libldb-0:1.1.20-3.el7rhgs.x86_64", "product": { "name": "libldb-0:1.1.20-3.el7rhgs.x86_64", "product_id": "libldb-0:1.1.20-3.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libldb@1.1.20-3.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "libldb-debuginfo-0:1.1.20-3.el7rhgs.x86_64", "product": { "name": "libldb-debuginfo-0:1.1.20-3.el7rhgs.x86_64", "product_id": "libldb-debuginfo-0:1.1.20-3.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libldb-debuginfo@1.1.20-3.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "ldb-tools-0:1.1.20-3.el7rhgs.x86_64", "product": { "name": "ldb-tools-0:1.1.20-3.el7rhgs.x86_64", "product_id": "ldb-tools-0:1.1.20-3.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ldb-tools@1.1.20-3.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "pyldb-0:1.1.20-3.el7rhgs.x86_64", "product": { "name": "pyldb-0:1.1.20-3.el7rhgs.x86_64", "product_id": "pyldb-0:1.1.20-3.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pyldb@1.1.20-3.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "pyldb-devel-0:1.1.20-3.el7rhgs.x86_64", "product": { "name": "pyldb-devel-0:1.1.20-3.el7rhgs.x86_64", "product_id": "pyldb-devel-0:1.1.20-3.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pyldb-devel@1.1.20-3.el7rhgs?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libldb-0:1.1.20-3.el6rhs.src", "product": { "name": "libldb-0:1.1.20-3.el6rhs.src", "product_id": "libldb-0:1.1.20-3.el6rhs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libldb@1.1.20-3.el6rhs?arch=src" } } }, { "category": "product_version", "name": "libldb-0:1.1.20-3.el7rhgs.src", "product": { "name": "libldb-0:1.1.20-3.el7rhgs.src", "product_id": "libldb-0:1.1.20-3.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libldb@1.1.20-3.el7rhgs?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ldb-tools-0:1.1.20-3.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.1 on RHEL-6", "product_id": "6Server-RH-Gluster-3-Server:ldb-tools-0:1.1.20-3.el6rhs.x86_64" }, "product_reference": "ldb-tools-0:1.1.20-3.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "libldb-0:1.1.20-3.el6rhs.src as a component of Red Hat Gluster Storage Server 3.1 on RHEL-6", "product_id": "6Server-RH-Gluster-3-Server:libldb-0:1.1.20-3.el6rhs.src" }, "product_reference": "libldb-0:1.1.20-3.el6rhs.src", "relates_to_product_reference": "6Server-RH-Gluster-3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "libldb-0:1.1.20-3.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.1 on RHEL-6", "product_id": "6Server-RH-Gluster-3-Server:libldb-0:1.1.20-3.el6rhs.x86_64" }, "product_reference": "libldb-0:1.1.20-3.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "libldb-debuginfo-0:1.1.20-3.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.1 on RHEL-6", "product_id": "6Server-RH-Gluster-3-Server:libldb-debuginfo-0:1.1.20-3.el6rhs.x86_64" }, "product_reference": "libldb-debuginfo-0:1.1.20-3.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "libldb-devel-0:1.1.20-3.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.1 on RHEL-6", "product_id": "6Server-RH-Gluster-3-Server:libldb-devel-0:1.1.20-3.el6rhs.x86_64" }, "product_reference": "libldb-devel-0:1.1.20-3.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "pyldb-0:1.1.20-3.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.1 on RHEL-6", "product_id": "6Server-RH-Gluster-3-Server:pyldb-0:1.1.20-3.el6rhs.x86_64" }, "product_reference": "pyldb-0:1.1.20-3.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "pyldb-devel-0:1.1.20-3.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.1 on RHEL-6", "product_id": "6Server-RH-Gluster-3-Server:pyldb-devel-0:1.1.20-3.el6rhs.x86_64" }, "product_reference": "pyldb-devel-0:1.1.20-3.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "ldb-tools-0:1.1.20-3.el7rhgs.x86_64 as a component of Red Hat Gluster 3 Samba on RHEL-7", "product_id": "7Server-RH-Gluster-3-Samba:ldb-tools-0:1.1.20-3.el7rhgs.x86_64" }, "product_reference": "ldb-tools-0:1.1.20-3.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3-Samba" }, { "category": "default_component_of", "full_product_name": { "name": "libldb-0:1.1.20-3.el7rhgs.src as a component of Red Hat Gluster 3 Samba on RHEL-7", "product_id": "7Server-RH-Gluster-3-Samba:libldb-0:1.1.20-3.el7rhgs.src" }, "product_reference": "libldb-0:1.1.20-3.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3-Samba" }, { "category": "default_component_of", "full_product_name": { "name": "libldb-0:1.1.20-3.el7rhgs.x86_64 as a component of Red Hat Gluster 3 Samba on RHEL-7", "product_id": "7Server-RH-Gluster-3-Samba:libldb-0:1.1.20-3.el7rhgs.x86_64" }, "product_reference": "libldb-0:1.1.20-3.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3-Samba" }, { "category": "default_component_of", "full_product_name": { "name": "libldb-debuginfo-0:1.1.20-3.el7rhgs.x86_64 as a component of Red Hat Gluster 3 Samba on RHEL-7", "product_id": "7Server-RH-Gluster-3-Samba:libldb-debuginfo-0:1.1.20-3.el7rhgs.x86_64" }, "product_reference": "libldb-debuginfo-0:1.1.20-3.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3-Samba" }, { "category": "default_component_of", "full_product_name": { "name": "libldb-devel-0:1.1.20-3.el7rhgs.x86_64 as a component of Red Hat Gluster 3 Samba on RHEL-7", "product_id": "7Server-RH-Gluster-3-Samba:libldb-devel-0:1.1.20-3.el7rhgs.x86_64" }, "product_reference": "libldb-devel-0:1.1.20-3.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3-Samba" }, { "category": "default_component_of", "full_product_name": { "name": "pyldb-0:1.1.20-3.el7rhgs.x86_64 as a component of Red Hat Gluster 3 Samba on RHEL-7", "product_id": "7Server-RH-Gluster-3-Samba:pyldb-0:1.1.20-3.el7rhgs.x86_64" }, "product_reference": "pyldb-0:1.1.20-3.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3-Samba" }, { "category": "default_component_of", "full_product_name": { "name": "pyldb-devel-0:1.1.20-3.el7rhgs.x86_64 as a component of Red Hat Gluster 3 Samba on RHEL-7", "product_id": "7Server-RH-Gluster-3-Samba:pyldb-devel-0:1.1.20-3.el7rhgs.x86_64" }, "product_reference": "pyldb-devel-0:1.1.20-3.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3-Samba" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Samba project" ] }, { "names": [ "Thilo Uttendorfer" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2015-3223", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2015-12-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1290287" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the ldb_wildcard_compare() function of libldb. A remote attacker could send a specially crafted packet that, when processed by an application using libldb (for example the AD LDAP server in Samba), would cause that application to consume an excessive amount of memory and crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "libldb: Remote DoS in Samba (AD) LDAP server", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RH-Gluster-3-Server:ldb-tools-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:libldb-0:1.1.20-3.el6rhs.src", "6Server-RH-Gluster-3-Server:libldb-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:libldb-debuginfo-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:libldb-devel-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:pyldb-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:pyldb-devel-0:1.1.20-3.el6rhs.x86_64", "7Server-RH-Gluster-3-Samba:ldb-tools-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:libldb-0:1.1.20-3.el7rhgs.src", "7Server-RH-Gluster-3-Samba:libldb-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:libldb-debuginfo-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:libldb-devel-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:pyldb-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:pyldb-devel-0:1.1.20-3.el7rhgs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3223" }, { "category": "external", "summary": "RHBZ#1290287", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1290287" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3223", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3223" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3223", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3223" }, { "category": "external", "summary": "https://www.samba.org/samba/security/CVE-2015-3223.html", "url": "https://www.samba.org/samba/security/CVE-2015-3223.html" } ], "release_date": "2015-12-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-01-08T09:13:42+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RH-Gluster-3-Server:ldb-tools-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:libldb-0:1.1.20-3.el6rhs.src", "6Server-RH-Gluster-3-Server:libldb-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:libldb-debuginfo-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:libldb-devel-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:pyldb-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:pyldb-devel-0:1.1.20-3.el6rhs.x86_64", "7Server-RH-Gluster-3-Samba:ldb-tools-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:libldb-0:1.1.20-3.el7rhgs.src", "7Server-RH-Gluster-3-Samba:libldb-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:libldb-debuginfo-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:libldb-devel-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:pyldb-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:pyldb-devel-0:1.1.20-3.el7rhgs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0014" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RH-Gluster-3-Server:ldb-tools-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:libldb-0:1.1.20-3.el6rhs.src", "6Server-RH-Gluster-3-Server:libldb-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:libldb-debuginfo-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:libldb-devel-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:pyldb-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:pyldb-devel-0:1.1.20-3.el6rhs.x86_64", "7Server-RH-Gluster-3-Samba:ldb-tools-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:libldb-0:1.1.20-3.el7rhgs.src", "7Server-RH-Gluster-3-Samba:libldb-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:libldb-debuginfo-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:libldb-devel-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:pyldb-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:pyldb-devel-0:1.1.20-3.el7rhgs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libldb: Remote DoS in Samba (AD) LDAP server" }, { "acknowledgments": [ { "names": [ "Samba project" ] }, { "names": [ "Douglas Bagnall" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2015-5330", "cwe": { "id": "CWE-135", "name": "Incorrect Calculation of Multi-Byte String Length" }, "discovery_date": "2015-11-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1281326" } ], "notes": [ { "category": "description", "text": "A memory-read flaw was found in the way the libldb library processed LDB DN records with a null byte. An authenticated, remote attacker could use this flaw to read heap-memory pages from the server.", "title": "Vulnerability description" }, { "category": "summary", "text": "libldb: remote memory read in the Samba LDAP server", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RH-Gluster-3-Server:ldb-tools-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:libldb-0:1.1.20-3.el6rhs.src", "6Server-RH-Gluster-3-Server:libldb-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:libldb-debuginfo-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:libldb-devel-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:pyldb-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:pyldb-devel-0:1.1.20-3.el6rhs.x86_64", "7Server-RH-Gluster-3-Samba:ldb-tools-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:libldb-0:1.1.20-3.el7rhgs.src", "7Server-RH-Gluster-3-Samba:libldb-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:libldb-debuginfo-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:libldb-devel-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:pyldb-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:pyldb-devel-0:1.1.20-3.el7rhgs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-5330" }, { "category": "external", "summary": "RHBZ#1281326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1281326" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-5330", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5330" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-5330", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5330" }, { "category": "external", "summary": "https://www.samba.org/samba/security/CVE-2015-5330.html", "url": "https://www.samba.org/samba/security/CVE-2015-5330.html" } ], "release_date": "2015-12-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-01-08T09:13:42+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RH-Gluster-3-Server:ldb-tools-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:libldb-0:1.1.20-3.el6rhs.src", "6Server-RH-Gluster-3-Server:libldb-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:libldb-debuginfo-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:libldb-devel-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:pyldb-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:pyldb-devel-0:1.1.20-3.el6rhs.x86_64", "7Server-RH-Gluster-3-Samba:ldb-tools-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:libldb-0:1.1.20-3.el7rhgs.src", "7Server-RH-Gluster-3-Samba:libldb-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:libldb-debuginfo-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:libldb-devel-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:pyldb-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:pyldb-devel-0:1.1.20-3.el7rhgs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0014" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Server-RH-Gluster-3-Server:ldb-tools-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:libldb-0:1.1.20-3.el6rhs.src", "6Server-RH-Gluster-3-Server:libldb-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:libldb-debuginfo-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:libldb-devel-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:pyldb-0:1.1.20-3.el6rhs.x86_64", "6Server-RH-Gluster-3-Server:pyldb-devel-0:1.1.20-3.el6rhs.x86_64", "7Server-RH-Gluster-3-Samba:ldb-tools-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:libldb-0:1.1.20-3.el7rhgs.src", "7Server-RH-Gluster-3-Samba:libldb-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:libldb-debuginfo-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:libldb-devel-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:pyldb-0:1.1.20-3.el7rhgs.x86_64", "7Server-RH-Gluster-3-Samba:pyldb-devel-0:1.1.20-3.el7rhgs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libldb: remote memory read in the Samba LDAP server" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.