CVE-2017-15135

NameCVE-2017-15135
DescriptionIt was found that 389-ds-base since 1.3.6.1 up to and including 1.4.0.3 did not always handle internal hash comparison operations correctly during the authentication process. A remote, unauthenticated attacker could potentially use this flaw to bypass the authentication process under very rare and specific circumstances.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)
Debian Bugs888451

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
389-ds-base (PTS)jessie1.3.3.5-4fixed
jessie (security)1.3.3.5-4+deb8u1fixed
stretch1.3.5.17-2fixed
sid1.3.8.2-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
389-ds-basesource(unstable)1.3.7.9-1medium888451
389-ds-basesourcejessie(not affected)
389-ds-basesourcestretch(not affected)

Notes

[stretch] - 389-ds-base <not-affected> (Affected code was never backported)
[jessie] - 389-ds-base <not-affected> (vulnerable code (patch for CVE-2016-5405) not applied)

Search for package or bug name: Reporting problems