Name | CVE-2023-1055 |
Description | A flaw was found in RHDS 11 and RHDS 12. While browsing entries LDAP tries to decode the userPassword attribute instead of the userCertificate attribute which could lead into sensitive information leaked. An attacker with a local account where the cockpit-389-ds is running can list the processes and display the hashed passwords. The highest threat from this vulnerability is to data confidentiality. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1034891 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
389-ds-base (PTS) | jessie, jessie (lts) | 1.3.3.5-4+deb8u7 | vulnerable |
| stretch | 1.3.5.17-2 | vulnerable |
| buster (security), buster, buster (lts) | 1.4.0.21-1+deb10u1 | vulnerable |
| bullseye | 1.4.4.11-2 | vulnerable |
| bookworm | 2.3.1+dfsg1-1 | vulnerable |
| sid, trixie | 3.1.1+dfsg1-2 | fixed |
The information below is based on the following data on fixed versions.
Notes
[bookworm] - 389-ds-base <no-dsa> (Minor issue)
[bullseye] - 389-ds-base <no-dsa> (Minor issue)
[buster] - 389-ds-base <no-dsa> (Minor issue)
https://bugzilla.redhat.com/show_bug.cgi?id=2173517
https://github.com/389ds/389-ds-base/commit/8483d60de374be78ce3dd423ac7ad7a3cdc5eaca (389-ds-base-2.3.3)
https://github.com/389ds/389-ds-base/commit/2038989d477d6281463668c91f72649fde880145 (389-ds-base-2.2.8)
https://github.com/389ds/389-ds-base/commit/92f9d3b9d06c1729e536948c638761c9fa7c962a (389-ds-base-1.4.3.35)