-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2013.0247
      Moderate: 389-ds-base security, bug fix, and enhancement update
                             22 February 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           389-ds-base
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 6
                   Red Hat Enterprise Linux WS/Desktop 6
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Access Privileged Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2012-4450  

Original Bulletin: 
   https://rhn.redhat.com/errata/RHSA-2013-0503.html

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Red Hat. It is recommended that administrators
         running 389-ds-base check for an updated version of the software for
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: 389-ds-base security, bug fix, and enhancement update
Advisory ID:       RHSA-2013:0503-03
Product:           Red Hat Enterprise Linux
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2013-0503.html
Issue date:        2013-02-21
CVE Names:         CVE-2012-4450 
=====================================================================

1. Summary:

Updated 389-ds-base packages that fix one security issue, numerous bugs,
and add various enhancements are now available for Red Hat Enterprise
Linux 6.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64

3. Description:

The 389-ds-base packages provide 389 Directory Server, which is an LDAPv3
compliant server. The base packages include the Lightweight Directory
Access Protocol (LDAP) server and command-line utilities for server
administration.

A flaw was found in the way 389 Directory Server enforced ACLs after
performing an LDAP modify relative distinguished name (modrdn) operation.
After modrdn was used to move part of a tree, the ACLs defined on the moved
(Distinguished Name) were not properly enforced until the server was
restarted. This could allow LDAP users to access information that should be
restricted by the defined ACLs. (CVE-2012-4450)

This issue was discovered by Noriko Hosoi of Red Hat.

These updated 389-ds-base packages include numerous bug fixes and
enhancements. Space precludes documenting all of these changes in this
advisory. Users are directed to the Red Hat Enterprise Linux 6.4
Technical Notes, linked to in the References, for information on the most
significant of these changes.

All users of 389-ds-base are advised to upgrade to these updated packages,
which correct this issue and provide numerous bug fixes and enhancements.
After installing this update, the 389 server service will be restarted
automatically.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

5. Bugs fixed (http://bugzilla.redhat.com/):

742054 - SASL/PLAIN binds do not work
746642 - [RFE] define pam_passthru service per subtree
757836 - logconv.pl restarts count on conn=0 instead of conn=1
768084 - [RFE] Allow automember to work on entries that have already been added
782975 - krbExtraData is being null modified and replicated on each ssh login
800051 - Rebase 389-ds-base to 1.2.11
818762 - winsync should not delete entry that appears to be out of scope
830256 - Audit log - clear text password in user changes
830331 - ns-slapd exits/crashes if /var fills up
830335 - restore of replica ldif file on second master after deleting two records shows only 1 deletion
830336 - db deadlock return should not log error
830337 - usn + mmr = deletions are not replicated
830338 - Change DS to purge ticket from krb cache in case of authentication error
830340 - Make the CLEANALLRUV task one step
830343 - managed entry sometimes doesn't delete the managed entry
830344 - [RFE] Improve replication agreement status messages
830346 - ADD operations not in audit log
830347 - 389 DS does not support multiple paging controls on a single connection
830348 - Slow shutdown when you have 100+ replication agreements
830349 - cannot use & in a sasl map search filter
830353 - valgrind reported memleaks and mem errors
830355 - [RFE] improve cleanruv functionality
830356 - coverity 12625-12629 - leaks, dead code, unchecked return
832560 - [abrt] 389-ds-base-1.2.10.6-1.fc16: slapi_attr_value_cmp: Process /usr/sbin/ns-slapd was killed by signal 11 (SIGSEGV)
833202 - transaction retries need to be cache aware
833218 - ldapmodify returns Operations error
833222 - memberOf attribute and plugin behaviour between sub-suffixes
834046 - [RFE] Add nsTLS1 attribute to schema and objectclass nsEncryptionConfig
834047 - Fine Grained Password policy: if passwordHistory is on, deleting the password fails.
834049 - [RFE] Add schema for DNA plugin
834052 - [RFE] limiting Directory Manager (nsslapd-rootdn) bind access by source host (e.g. 127.0.0.1)
834053 - [RFE] Plugins - ability to control behavior of modifyTimestamp/modifiersName
834054 - Should only update modifyTimestamp/modifiersName on MODIFY ops
834056 - Automembership plugin fails in a MMR setup, if data and config area mixed in the plugin configuration
834057 - ldap-agent crashes on start with signal SIGSEGV
834058 - [RFE] logconv.pl : use of getopts to parse commandline options
834060 - passwordMaxFailure should lockout password one sooner - and should be configurable to avoid regressions
834061 - [RFE] RHDS: Implement SO_KEEPALIVE in network calls.
834063 - [RFE] enable attribute that tracks when a password was last set on an entry in the LDAP store
834064 - dnaNextValue gets incremented even if the user addition fails
834065 - Adding Replication agreement should complain if required nsds5ReplicaCredentials not supplied
834074 - [RFE] Disable replication agreements
834075 - logconv.pl reporting unindexed search with different search base than shown in access logs
835238 - Account Usability Control Not Working
836386 - slapi_ldap_bind() doesn't check bind results
838706 - referint modrdn not working if case is different
840153 - Impossible to rename entry (modrdn) with Attribute Uniqueness plugin enabled
841600 - Referential integrity plug-in does not work when update interval is not zero
842437 - dna memleak reported by valgrind
842438 - Report during startup if nsslapd-cachememsize is too small
842440 - memberof performance enhancement
842441 - "Server is unwilling to perform" when running ldapmodify on nsds5ReplicaStripAttrs
847868 - [RFE] support posix schema for user and group sync
850683 - nsds5ReplicaEnabled can be set with any invalid values.
852087 - [RFE] add attribute nsslapd-readonly so we can reference it in acis
852088 - server to server ssl client auth broken with latest openldap
852202 - Ipa master system initiated more than a dozen simultaneous replication sessions, shut itself down and wiped out its db
852839 - variable dn should not be used in ldbm_back_delete
855438 - CLEANALLRUV task gets stuck on winsync replication agreement
860603 - CVE-2012-4450 389-ds-base: Change on SLAPI_MODRDN_NEWSUPERIOR is not evaluated in ACL (ACL rules bypass possible)
860772 - Change on SLAPI_MODRDN_NEWSUPERIOR is not evaluated in acl
863576 - Dirsrv deadlock locking up IPA
864594 - anonymous limits are being applied to directory manager
868841 - Newly created users with organizationalPerson objectClass fails to sync from AD to DS with missing attribute error
868853 - Winsync: DS error logs report wrong version of Windows AD when winsync is configured.
870158 - slapd entered to infinite loop during new index addition
870162 - Cannot abandon simple paged result search
875862 - crash in DNA if no dnamagicregen is specified
876694 - RedHat Directory Server crashes (segfaults) when moving ldap entry
878111 - ns-slapd segfaults if it cannot rename the logs
880305 - spec file missing dependencies for x86_64 6ComputeNode
887855 - RootDN Access Control plugin is missing after upgrade from RHEL63 to RHEL64
889083 - For modifiersName/internalModifiersName feature, internalModifiersname is not working for DNA plugin
891930 - DNA plugin no longer reports additional info when range is depleted
896256 - updating package touches configuration files

6. Package List:

Red Hat Enterprise Linux Desktop Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/389-ds-base-1.2.11.15-11.el6.src.rpm

i386:
389-ds-base-1.2.11.15-11.el6.i686.rpm
389-ds-base-debuginfo-1.2.11.15-11.el6.i686.rpm
389-ds-base-devel-1.2.11.15-11.el6.i686.rpm
389-ds-base-libs-1.2.11.15-11.el6.i686.rpm

x86_64:
389-ds-base-1.2.11.15-11.el6.x86_64.rpm
389-ds-base-debuginfo-1.2.11.15-11.el6.i686.rpm
389-ds-base-debuginfo-1.2.11.15-11.el6.x86_64.rpm
389-ds-base-devel-1.2.11.15-11.el6.i686.rpm
389-ds-base-devel-1.2.11.15-11.el6.x86_64.rpm
389-ds-base-libs-1.2.11.15-11.el6.i686.rpm
389-ds-base-libs-1.2.11.15-11.el6.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/389-ds-base-1.2.11.15-11.el6.src.rpm

x86_64:
389-ds-base-1.2.11.15-11.el6.x86_64.rpm
389-ds-base-debuginfo-1.2.11.15-11.el6.i686.rpm
389-ds-base-debuginfo-1.2.11.15-11.el6.x86_64.rpm
389-ds-base-devel-1.2.11.15-11.el6.i686.rpm
389-ds-base-devel-1.2.11.15-11.el6.x86_64.rpm
389-ds-base-libs-1.2.11.15-11.el6.i686.rpm
389-ds-base-libs-1.2.11.15-11.el6.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/389-ds-base-1.2.11.15-11.el6.src.rpm

i386:
389-ds-base-1.2.11.15-11.el6.i686.rpm
389-ds-base-debuginfo-1.2.11.15-11.el6.i686.rpm
389-ds-base-libs-1.2.11.15-11.el6.i686.rpm

x86_64:
389-ds-base-1.2.11.15-11.el6.x86_64.rpm
389-ds-base-debuginfo-1.2.11.15-11.el6.i686.rpm
389-ds-base-debuginfo-1.2.11.15-11.el6.x86_64.rpm
389-ds-base-libs-1.2.11.15-11.el6.i686.rpm
389-ds-base-libs-1.2.11.15-11.el6.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/389-ds-base-1.2.11.15-11.el6.src.rpm

i386:
389-ds-base-debuginfo-1.2.11.15-11.el6.i686.rpm
389-ds-base-devel-1.2.11.15-11.el6.i686.rpm

x86_64:
389-ds-base-debuginfo-1.2.11.15-11.el6.i686.rpm
389-ds-base-debuginfo-1.2.11.15-11.el6.x86_64.rpm
389-ds-base-devel-1.2.11.15-11.el6.i686.rpm
389-ds-base-devel-1.2.11.15-11.el6.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/389-ds-base-1.2.11.15-11.el6.src.rpm

i386:
389-ds-base-1.2.11.15-11.el6.i686.rpm
389-ds-base-debuginfo-1.2.11.15-11.el6.i686.rpm
389-ds-base-libs-1.2.11.15-11.el6.i686.rpm

x86_64:
389-ds-base-1.2.11.15-11.el6.x86_64.rpm
389-ds-base-debuginfo-1.2.11.15-11.el6.i686.rpm
389-ds-base-debuginfo-1.2.11.15-11.el6.x86_64.rpm
389-ds-base-libs-1.2.11.15-11.el6.i686.rpm
389-ds-base-libs-1.2.11.15-11.el6.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/389-ds-base-1.2.11.15-11.el6.src.rpm

i386:
389-ds-base-debuginfo-1.2.11.15-11.el6.i686.rpm
389-ds-base-devel-1.2.11.15-11.el6.i686.rpm

x86_64:
389-ds-base-debuginfo-1.2.11.15-11.el6.i686.rpm
389-ds-base-debuginfo-1.2.11.15-11.el6.x86_64.rpm
389-ds-base-devel-1.2.11.15-11.el6.i686.rpm
389-ds-base-devel-1.2.11.15-11.el6.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2012-4450.html
https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.4_Technical_Notes/pkg-389-ds-base.html
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2013 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFRJb9wXlSAg2UNWIIRAkz7AJ94maizfWfNoheueWxwd+xNb1P7fwCfWohG
kr7Rk9Yh8AetFdSPH8k+AH0=
=gywk
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBUSbht+4yVqjM2NGpAQKt4Q/+KJbzbOfMShSs0PHDk16hCkJMsevtL2fv
NK3tIvcbSmivgemhMfcucJVCmOxU5hjZ8m+VqsePh8cPlyqZTvLnIVfK3TBphq8i
xM37ZLEsi8mUmdYzpULbnVY6A+Bh3P++mqKJCkYu/7c1t1semJU7U9/QN++gscRA
G8tdjBB04kIOCZgnWfhEsY8HzjB6qc/K6BgXkocA0sw+knFzP5o64huz9XCUzKoN
yS3wda5vCqlClkaSngEKtK0yMOF3CLII318nnsrUwGBzEzNQztPc0KJsxSyG95bi
JjCCR3eyN8buXmc3oKPidSIWimcDQpgPGt9291D+sZBr9mTcofW/KTmeMXmS8shv
TNliAltt2Qe7G7ATFZo60jkqwQ0vNPcOhdFoQccNnHRXVDLLX3j/PV2Dx0pqZNVW
VEd/bRg/Mpau7BGFaokPI/NnLgEAYG/nNKUBvvrHD3f58GR6eKcZBlUJfVM83QB7
SUCiO0+yH3WnojKMTAklLaupU/XrMlVCSIdAda56xqbuf1K2MFAaTqJy2FmBogeS
bguOK/BEfcB8ackciNLqGbRMoH3rllRzh5ZpdAu+m9CwBTPZmI12VjEbguSNI5f4
Is5uqR78mze4cL7eXU+XH2uXfky/hwtHU/RBPd8VNphSlIoJy+ebDseZGTlDuDfR
HKHxk9o+ips=
=cDN1
-----END PGP SIGNATURE-----