Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.1570 389-ds-base 7 May 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: 389-ds-base Publisher: Debian Operating System: Debian GNU/Linux 8 UNIX variants (UNIX, Linux, OSX) Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2019-3883 Original Bulletin: https://lists.debian.org/debian-lts-announce/2019/05/msg00008.html Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running 389-ds-base check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- Package : 389-ds-base Version : 1.3.3.5-4+deb8u6 CVE ID : CVE-2019-3883 Debian Bug : 927939 In 389-ds-base up to version 1.4.1.2, requests were handled by worker threads. Each socket had been waited for by the worker for at most 'ioblocktimeout' seconds. However, this timeout applied only to un-encrypted requests. Connections using SSL/TLS were not taking this timeout into account during reads, and may have hung longer. An unauthenticated attacker could have repeatedly created hanging LDAP requests to hang all the workers, resulting in a Denial of Service. For Debian 8 "Jessie", this problem has been fixed in version 1.3.3.5-4+deb8u6. We recommend that you upgrade your 389-ds-base packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXNDBBGaOgq3Tt24GAQhgCRAApvqAGIdzhJ2tgQhM1mI9oF6R9zsQtwe7 jkspqifzbw00IVpxCzaDap9O0QjfoKHkx7bty29VyLp4BdTiRkX58Obr0krDWnr+ Ys1ctC273umCsEzUKubtVWNSlEfMG+KOD/S9lzd7LmaJy+JCIS7O4vSERD1g+Skh hrbwqmaJxupNoFW1eS7BB2phtwi8KEnEetFu+yi0wWRGq7m4+JzD8IkIwLofuk+q PlXFRzSPMvEE7fFl+ZHHUUO13D/e8Zol4Ue+yOLeWyiLb5z/eRo7xJCImYzMXyd0 7lY0NUEtwVwXSvXpoQa4MkYbD5bC5oIcGwnnW7u/Fs/loGTJJsuG/e4K4qnrFBhM coSp1xCu7YXKtxcwBi2YjfsTlg6bEiktjGxOiK/tGpW5MbVoNJojrztxaAlFQXjy mWE/JJwl7QmtV1G4D/RsRu0NZxCihU/Z1BC/dUWfrk00Wu2x/ytEr8NwkxeUV47D Ypa55PBykSasKNqYIbFEY4W16x9Kh+d63EF+RKzS7CBgxXomVFxJ8SbXYsaawN1w x78WhGdWy6y3dp1AICSkcXAH9AfvEuvpn4pLo7Wr4SzoHGYyfu6R9vpLSFxZ/nBD Ah0MD/QO6KiO4sHXeQ6sJgnnhYX0BJlsOQNwKr7fpplXZDn6lWDzxeghVVjN5rM2 GipK8oA6U/o= =PQKb -----END PGP SIGNATURE-----