The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of 389 Directory Server: denial of service via delete_passwdPolicy

Synthesis of the vulnerability 

An attacker can generate a fatal error via delete_passwdPolicy() of 389 Directory Server, in order to trigger a denial of service.
Impacted systems: RHEL, SLES.
Severity of this alert: 2/4.
Creation date: 26/09/2018.
Références of this alert: CVE-2018-14638, RHSA-2018:2757-01, SUSE-SU-2019:2155-1, VIGILANCE-VUL-27323.

Description of the vulnerability 

An attacker can generate a fatal error via delete_passwdPolicy() of 389 Directory Server, in order to trigger a denial of service.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This security vulnerability impacts software or systems such as RHEL, SLES.

Our Vigil@nce team determined that the severity of this computer weakness bulletin is medium.

The trust level is of type confirmed by the editor, with an origin of user account.

An attacker with a expert ability can exploit this security note.

Solutions for this threat 

RHEL 7.5: new 389-ds-base packages.
New packages are available:
  RHEL 7: 389-ds-base 1.3.7.5-28.el7_5

SUSE LE 15: new 389-ds packages.
New packages are available:
  SUSE LE 15 RTM: 389-ds 1.4.0.26~git0.8a2d3de6f-4.14.1
  SUSE LE 15 SP1: 389-ds 1.4.0.26~git0.8a2d3de6f-4.14.1
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides computers vulnerabilities announces. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.