CVE-2017-15135

NameCVE-2017-15135
DescriptionIt was found that 389-ds-base since 1.3.6.1 up to and including 1.4.0.3 did not always handle internal hash comparison operations correctly during the authentication process. A remote, unauthenticated attacker could potentially use this flaw to bypass the authentication process under very rare and specific circumstances.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs888451

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
389-ds-base (PTS)jessie, jessie (lts)1.3.3.5-4+deb8u7fixed
stretch1.3.5.17-2fixed
buster (security), buster, buster (lts)1.4.0.21-1+deb10u1fixed
bullseye1.4.4.11-2fixed
bookworm2.3.1+dfsg1-1fixed
sid, trixie3.1.1+dfsg1-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
389-ds-basesourcejessie(not affected)
389-ds-basesourcestretch(not affected)
389-ds-basesource(unstable)1.3.7.9-1888451

Notes

[stretch] - 389-ds-base <not-affected> (Affected code was never backported)
[jessie] - 389-ds-base <not-affected> (vulnerable code (patch for CVE-2016-5405) not applied)

Search for package or bug name: Reporting problems