CVE-2017-2591

Priority
Description
389-ds-base before version 1.3.6 is vulnerable to an improperly NULL
terminated array in the uniqueness_entry_to_config() function in the
"attribute uniqueness" plugin of 389 Directory Server. An authenticated, or
possibly unauthenticated, attacker could use this flaw to force an
out-of-bound heap memory read, possibly triggering a crash of the LDAP
service.
Notes
leosilvathe project changed its site. That's the current one: https://pagure.io/389-ds-base
for commits from the older site, just copy the sha and paste with /c/<sha-commit>
Package
Upstream:released (1.3.5.15-2)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needs-triage)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [code not present])
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected
Ubuntu 19.10 (Eoan Ermine):not-affected (1.4.0.18-1)
Ubuntu 20.04 (Focal Fossa):not-affected (1.4.0.18-1)
Patches:
Upstream:https://pagure.io/389-ds-base/c/ffda694dd622b31277da07be76d3469fad86150f
More Information

Updated: 2020-01-29 18:47:52 UTC (commit 40f18bf14da5fb50662e1f861ea594a462b207fe)