__________________________________________________________ The U.S. Department of Energy Computer Incident Advisory Capability ___ __ __ _ ___ / | /_\ / \___ __|__ / \ \___ __________________________________________________________ INFORMATION BULLETIN Openldap and nss_ldap Security Update [Red Hat RHSA-2005:767-8] October 17, 2005 19:00 GMT Number Q-021 [REVISED 31 Oct 2005] ______________________________________________________________________________ PROBLEM: 1) There is a bug in the way OpenLDAP, nss_ldap and pam_ldap refer LDAP servers, and 2) There is a bug in the way the pam_ldap module processed certain faliure messages. PLATFORM: Red Hat Desktop (v. 3 and v. 4) Red Hat Enterprise Linux AS, ES, WS (v. 2.1, v. 3, v. 4) Red Hat Linux Advanced Workstation 2.1 for Itanium Processor SGI ProPack 3 Service Pack 6 for SGI Altix family of systems DAMAGE: 1) If a client connection is referred to a different server, it is possible that the reffered connection will not be encrypted even in the client has "ssl start_tls" in its ldap.conf file, and 2) If the server includes supplemental data in an authentication failure result messate, but the data does not include any specific error code, the pam_ldap module would proceed as if the authentication request had succeeded, and authentication would succeed. SOLUTION: Upgrade to the appropriate version. ______________________________________________________________________________ VULNERABILITY The risk is MEDIUM. 1) If a client connection is referred to a ASSESSMENT: different server, it is possible that the reffered connection will not be encrypted even in the client has "ssl start_tls" in its ldap.conf file, and 2) If the server includes supplemental data in an authentication failure result messate, but the data does not include any specific error code, the pam_ldap module would proceed as if the authentication request had succeeded, and authentication would succeed. ______________________________________________________________________________ LINKS: CIAC BULLETIN: http://www.ciac.org/ciac/bulletins/q-021.shtml ORIGINAL BULLETIN: Red Hat RHSA-2005:767-8 https://rhn.redhat.com/errata/RHSA-2005-767.html ADDITIONAL LINKS: Red Hat RHSA-2005:751 https://rhn.redhat.com/errata/RHSA-2005-751.html SGI Security Advisory Number 20051003-02-U ftp://patches.sgi.com/support/free/security/advisories/20051003-02-U.asc CVE: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name= CAN-2005-2069 CAN-2008-2641 ______________________________________________________________________________ REVISION HISTORY: 10/31/2005 - added links to Red Hat Security Advisory RHSA-2005:751 and SGI Advanced Linux Environment 3 Security Update #50 that provide patches for this vulnerability. [***** Start Red Hat RHSA-2005:767-8 *****] Moderate: openldap and nss_ldap security update Advisory: RHSA-2005:767-8 Type: Security Advisory Issued on: 2005-10-17 Last updated on: 2005-10-17 Affected Products: Red Hat Desktop (v. 4) Red Hat Enterprise Linux AS (v. 4) Red Hat Enterprise Linux ES (v. 4) Red Hat Enterprise Linux WS (v. 4) CVEs (cve.mitre.org): CAN-2005-2069 CAN-2005-2641 Details Updated openldap and nss_ldap packages that correct a potential password disclosure issue and possible authentication vulnerability are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. OpenLDAP is an open source suite of LDAP (Lightweight Directory Access Protocol) applications and development tools. The nss_ldap module is an extension for use with GNU libc which allows applications to, without internal modification, consult a directory service using LDAP to supplement information that would be read from local files such as /etc/passwd, /etc/group, and /etc/shadow. A bug was found in the way OpenLDAP, nss_ldap, and pam_ldap refer LDAP servers. If a client connection is referred to a different server, it is possible that the referred connection will not be encrypted even if the client has "ssl start_tls" in its ldap.conf file. The Common Vulnerabilities and Exposures project has assigned the name CAN-2005-2069 to this issue. A bug was found in the way the pam_ldap module processed certain failure messages. If the server includes supplemental data in an authentication failure result message, but the data does not include any specific error code, the pam_ldap module would proceed as if the authentication request had succeeded, and authentication would succeed. The Common Vulnerabilities and Exposures project has assigned the name CAN-2005-2641 to this issue. Additionally the following issues are corrected in this erratum. - The OpenLDAP upgrading documentation has been updated. - Fix a database deadlock locking issue. - A fix where slaptest segfaults on exit after successful check. - The library libslapd_db-4.2.so is now located in an architecture-dependent directory. - The LDAP client no longer enters an infinite loop when the server returns a reference to itself. - The pam_ldap module adds the ability to check user passwords using a directory server to PAM-aware applications. - The directory server can now include supplemental information regarding the state of the user's account if a client indicates that it supports such a feature. All users of OpenLDAP and nss_ldap are advised to upgrade to these updated packages, which contain backported fixes that resolve these issues. Solution Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command: up2date For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system: http://www.redhat.com/docs/manuals/enterprise/ Updated packages Red Hat Desktop (v. 4) -------------------------------------------------------------------------------- SRPMS: nss_ldap-226-10.src.rpm 9409c1b60a03d305dbfd39c9aa11a569 openldap-2.2.13-4.src.rpm 27f92ebbc8f3144455985810efdb4258 IA-32: compat-openldap-2.1.30-4.i386.rpm 73b4bbf3f5a4abe732d88282d8d67718 nss_ldap-226-10.i386.rpm a8d23ec817aaf0a3e3dfabf7f631e702 openldap-2.2.13-4.i386.rpm de29b5462ab40709e15048984f81c61a openldap-clients-2.2.13-4.i386.rpm 9a18eef0e837c9c9be80cfbadc5084fc openldap-devel-2.2.13-4.i386.rpm af6791b956695160bce8434ef1eb79fd openldap-servers-2.2.13-4.i386.rpm c4541305ea10fa75d3bec7626923c2da openldap-servers-sql-2.2.13-4.i386.rpm 6657ec4139b3b0dd2a1823d4cc94ffa5 x86_64: compat-openldap-2.1.30-4.i386.rpm 73b4bbf3f5a4abe732d88282d8d67718 compat-openldap-2.1.30-4.x86_64.rpm 19b68fb6f1aba83dc7a3f6a1d6d049a2 nss_ldap-226-10.i386.rpm a8d23ec817aaf0a3e3dfabf7f631e702 nss_ldap-226-10.x86_64.rpm 3d7a48fd418d6a741c53c4e347267304 openldap-2.2.13-4.i386.rpm de29b5462ab40709e15048984f81c61a openldap-2.2.13-4.x86_64.rpm ee0ad5a989a9762ffd5721885a2c6c3b openldap-clients-2.2.13-4.x86_64.rpm 975503322616d5f493edd80a95cb2bde openldap-devel-2.2.13-4.x86_64.rpm 65e93b1c063337bcd7517e4b4ca4be62 openldap-servers-2.2.13-4.x86_64.rpm 5cdb5ceaa647dae166fc40955b621ca7 openldap-servers-sql-2.2.13-4.x86_64.rpm 81d9be54d2c028cf1e7f1089666b042e Red Hat Enterprise Linux AS (v. 4) -------------------------------------------------------------------------------- SRPMS: nss_ldap-226-10.src.rpm 9409c1b60a03d305dbfd39c9aa11a569 openldap-2.2.13-4.src.rpm 27f92ebbc8f3144455985810efdb4258 IA-32: compat-openldap-2.1.30-4.i386.rpm 73b4bbf3f5a4abe732d88282d8d67718 nss_ldap-226-10.i386.rpm a8d23ec817aaf0a3e3dfabf7f631e702 openldap-2.2.13-4.i386.rpm de29b5462ab40709e15048984f81c61a openldap-clients-2.2.13-4.i386.rpm 9a18eef0e837c9c9be80cfbadc5084fc openldap-devel-2.2.13-4.i386.rpm af6791b956695160bce8434ef1eb79fd openldap-servers-2.2.13-4.i386.rpm c4541305ea10fa75d3bec7626923c2da openldap-servers-sql-2.2.13-4.i386.rpm 6657ec4139b3b0dd2a1823d4cc94ffa5 IA-64: compat-openldap-2.1.30-4.i386.rpm 73b4bbf3f5a4abe732d88282d8d67718 compat-openldap-2.1.30-4.ia64.rpm 786e338fc582779c7b089ec798a9f420 nss_ldap-226-10.i386.rpm a8d23ec817aaf0a3e3dfabf7f631e702 nss_ldap-226-10.ia64.rpm f441869d9d5c0c205947b209ab837c8e openldap-2.2.13-4.i386.rpm de29b5462ab40709e15048984f81c61a openldap-2.2.13-4.ia64.rpm 3b92a10af4c163c1b05e3637f90b1390 openldap-clients-2.2.13-4.ia64.rpm ed17b1d4f3d325fa59a5bfddffa76de4 openldap-devel-2.2.13-4.ia64.rpm 8270970988620d9bcbdd1f3dbf730c45 openldap-servers-2.2.13-4.ia64.rpm b9ad5905b555ec0540b0c76b4923095a openldap-servers-sql-2.2.13-4.ia64.rpm ba43255ebbae8fcf314ea8e7ff24fb02 PPC: compat-openldap-2.1.30-4.ppc.rpm 6c73dbd71a15fc896cba9cebbad0e940 compat-openldap-2.1.30-4.ppc64.rpm 9cfcd189747749df49dfd1ce6d970dbf nss_ldap-226-10.ppc.rpm 53ecc8d0087ce66850c917f6d2eca720 nss_ldap-226-10.ppc64.rpm 5d887dbf09a520b7d955dd1d013afc90 openldap-2.2.13-4.ppc.rpm 01a780e83d18bbf855316fde0dc79022 openldap-2.2.13-4.ppc64.rpm e04396d22ab5647bcb9e65c7b0ebbc7a openldap-clients-2.2.13-4.ppc.rpm 58b357c479b1f4a578152d8837ca2dd0 openldap-devel-2.2.13-4.ppc.rpm 8b7d41b7a1c73827a74f4404ce431140 openldap-servers-2.2.13-4.ppc.rpm 08bb4452f9a615e5337da1c941342b0a openldap-servers-sql-2.2.13-4.ppc.rpm 323e7ecffd5293582db250c54ea89c4a s390: compat-openldap-2.1.30-4.s390.rpm 435f4a82d4f711ab4c95e9ad152787df nss_ldap-226-10.s390.rpm be7300e32b5d90a5d3a0bf21382b5b76 openldap-2.2.13-4.s390.rpm 6ea5a1e67729833534078e6e6cbfd9ed openldap-clients-2.2.13-4.s390.rpm 9c6a8551e046b6b9692d74b6804152d6 openldap-devel-2.2.13-4.s390.rpm 12f0c0304caa3f8a3d4393365e39172d openldap-servers-2.2.13-4.s390.rpm 8f1f40c4734b200c84563ee5c57a5bed openldap-servers-sql-2.2.13-4.s390.rpm e53d664770db4062913950be18a88b6f s390x: compat-openldap-2.1.30-4.s390.rpm 435f4a82d4f711ab4c95e9ad152787df compat-openldap-2.1.30-4.s390x.rpm 5a1236060e495ca213ea7d8ef985873c nss_ldap-226-10.s390.rpm be7300e32b5d90a5d3a0bf21382b5b76 nss_ldap-226-10.s390x.rpm 7b9debd04edba63caa073ce39a6e2d30 openldap-2.2.13-4.s390.rpm 6ea5a1e67729833534078e6e6cbfd9ed openldap-2.2.13-4.s390x.rpm dcb637778379b9d75c673e64c7dfe2a1 openldap-clients-2.2.13-4.s390x.rpm 991dee44e8cbd232d5e2f037bfa827c0 openldap-devel-2.2.13-4.s390x.rpm 67186e548509fcf95fb1f427a5fbf344 openldap-servers-2.2.13-4.s390x.rpm d38007090444a030393a008406ccfc28 openldap-servers-sql-2.2.13-4.s390x.rpm 6eaa07308cfbf39ff70dc8a71f914273 x86_64: compat-openldap-2.1.30-4.i386.rpm 73b4bbf3f5a4abe732d88282d8d67718 compat-openldap-2.1.30-4.x86_64.rpm 19b68fb6f1aba83dc7a3f6a1d6d049a2 nss_ldap-226-10.i386.rpm a8d23ec817aaf0a3e3dfabf7f631e702 nss_ldap-226-10.x86_64.rpm 3d7a48fd418d6a741c53c4e347267304 openldap-2.2.13-4.i386.rpm de29b5462ab40709e15048984f81c61a openldap-2.2.13-4.x86_64.rpm ee0ad5a989a9762ffd5721885a2c6c3b openldap-clients-2.2.13-4.x86_64.rpm 975503322616d5f493edd80a95cb2bde openldap-devel-2.2.13-4.x86_64.rpm 65e93b1c063337bcd7517e4b4ca4be62 openldap-servers-2.2.13-4.x86_64.rpm 5cdb5ceaa647dae166fc40955b621ca7 openldap-servers-sql-2.2.13-4.x86_64.rpm 81d9be54d2c028cf1e7f1089666b042e Red Hat Enterprise Linux ES (v. 4) -------------------------------------------------------------------------------- SRPMS: nss_ldap-226-10.src.rpm 9409c1b60a03d305dbfd39c9aa11a569 openldap-2.2.13-4.src.rpm 27f92ebbc8f3144455985810efdb4258 IA-32: compat-openldap-2.1.30-4.i386.rpm 73b4bbf3f5a4abe732d88282d8d67718 nss_ldap-226-10.i386.rpm a8d23ec817aaf0a3e3dfabf7f631e702 openldap-2.2.13-4.i386.rpm de29b5462ab40709e15048984f81c61a openldap-clients-2.2.13-4.i386.rpm 9a18eef0e837c9c9be80cfbadc5084fc openldap-devel-2.2.13-4.i386.rpm af6791b956695160bce8434ef1eb79fd openldap-servers-2.2.13-4.i386.rpm c4541305ea10fa75d3bec7626923c2da openldap-servers-sql-2.2.13-4.i386.rpm 6657ec4139b3b0dd2a1823d4cc94ffa5 IA-64: compat-openldap-2.1.30-4.i386.rpm 73b4bbf3f5a4abe732d88282d8d67718 compat-openldap-2.1.30-4.ia64.rpm 786e338fc582779c7b089ec798a9f420 nss_ldap-226-10.i386.rpm a8d23ec817aaf0a3e3dfabf7f631e702 nss_ldap-226-10.ia64.rpm f441869d9d5c0c205947b209ab837c8e openldap-2.2.13-4.i386.rpm de29b5462ab40709e15048984f81c61a openldap-2.2.13-4.ia64.rpm 3b92a10af4c163c1b05e3637f90b1390 openldap-clients-2.2.13-4.ia64.rpm ed17b1d4f3d325fa59a5bfddffa76de4 openldap-devel-2.2.13-4.ia64.rpm 8270970988620d9bcbdd1f3dbf730c45 openldap-servers-2.2.13-4.ia64.rpm b9ad5905b555ec0540b0c76b4923095a openldap-servers-sql-2.2.13-4.ia64.rpm ba43255ebbae8fcf314ea8e7ff24fb02 x86_64: compat-openldap-2.1.30-4.i386.rpm 73b4bbf3f5a4abe732d88282d8d67718 compat-openldap-2.1.30-4.x86_64.rpm 19b68fb6f1aba83dc7a3f6a1d6d049a2 nss_ldap-226-10.i386.rpm a8d23ec817aaf0a3e3dfabf7f631e702 nss_ldap-226-10.x86_64.rpm 3d7a48fd418d6a741c53c4e347267304 openldap-2.2.13-4.i386.rpm de29b5462ab40709e15048984f81c61a openldap-2.2.13-4.x86_64.rpm ee0ad5a989a9762ffd5721885a2c6c3b openldap-clients-2.2.13-4.x86_64.rpm 975503322616d5f493edd80a95cb2bde openldap-devel-2.2.13-4.x86_64.rpm 65e93b1c063337bcd7517e4b4ca4be62 openldap-servers-2.2.13-4.x86_64.rpm 5cdb5ceaa647dae166fc40955b621ca7 openldap-servers-sql-2.2.13-4.x86_64.rpm 81d9be54d2c028cf1e7f1089666b042e Red Hat Enterprise Linux WS (v. 4) -------------------------------------------------------------------------------- SRPMS: nss_ldap-226-10.src.rpm 9409c1b60a03d305dbfd39c9aa11a569 openldap-2.2.13-4.src.rpm 27f92ebbc8f3144455985810efdb4258 IA-32: compat-openldap-2.1.30-4.i386.rpm 73b4bbf3f5a4abe732d88282d8d67718 nss_ldap-226-10.i386.rpm a8d23ec817aaf0a3e3dfabf7f631e702 openldap-2.2.13-4.i386.rpm de29b5462ab40709e15048984f81c61a openldap-clients-2.2.13-4.i386.rpm 9a18eef0e837c9c9be80cfbadc5084fc openldap-devel-2.2.13-4.i386.rpm af6791b956695160bce8434ef1eb79fd openldap-servers-2.2.13-4.i386.rpm c4541305ea10fa75d3bec7626923c2da openldap-servers-sql-2.2.13-4.i386.rpm 6657ec4139b3b0dd2a1823d4cc94ffa5 IA-64: compat-openldap-2.1.30-4.i386.rpm 73b4bbf3f5a4abe732d88282d8d67718 compat-openldap-2.1.30-4.ia64.rpm 786e338fc582779c7b089ec798a9f420 nss_ldap-226-10.i386.rpm a8d23ec817aaf0a3e3dfabf7f631e702 nss_ldap-226-10.ia64.rpm f441869d9d5c0c205947b209ab837c8e openldap-2.2.13-4.i386.rpm de29b5462ab40709e15048984f81c61a openldap-2.2.13-4.ia64.rpm 3b92a10af4c163c1b05e3637f90b1390 openldap-clients-2.2.13-4.ia64.rpm ed17b1d4f3d325fa59a5bfddffa76de4 openldap-devel-2.2.13-4.ia64.rpm 8270970988620d9bcbdd1f3dbf730c45 openldap-servers-2.2.13-4.ia64.rpm b9ad5905b555ec0540b0c76b4923095a openldap-servers-sql-2.2.13-4.ia64.rpm ba43255ebbae8fcf314ea8e7ff24fb02 x86_64: compat-openldap-2.1.30-4.i386.rpm 73b4bbf3f5a4abe732d88282d8d67718 compat-openldap-2.1.30-4.x86_64.rpm 19b68fb6f1aba83dc7a3f6a1d6d049a2 nss_ldap-226-10.i386.rpm a8d23ec817aaf0a3e3dfabf7f631e702 nss_ldap-226-10.x86_64.rpm 3d7a48fd418d6a741c53c4e347267304 openldap-2.2.13-4.i386.rpm de29b5462ab40709e15048984f81c61a openldap-2.2.13-4.x86_64.rpm ee0ad5a989a9762ffd5721885a2c6c3b openldap-clients-2.2.13-4.x86_64.rpm 975503322616d5f493edd80a95cb2bde openldap-devel-2.2.13-4.x86_64.rpm 65e93b1c063337bcd7517e4b4ca4be62 openldap-servers-2.2.13-4.x86_64.rpm 5cdb5ceaa647dae166fc40955b621ca7 openldap-servers-sql-2.2.13-4.x86_64.rpm 81d9be54d2c028cf1e7f1089666b042e (The unlinked packages above are only available from the Red Hat Network) Bugs fixed (see bugzilla for more information) 159151 - Authconfig update creates a problem with OpenLDAP server 162482 - CAN-2005-2069 openldap password disclosure issue 166163 - CAN-2005-2641 pam_ldap policy vulnerability References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2069 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2641 Keywords disclosure, pam_ldap, password, policy, referral -------------------------------------------------------------------------------- These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: https://www.redhat.com/security/team/key/#package The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/ [***** End Red Hat RHSA-2005:767-8 *****] _______________________________________________________________________________ CIAC wishes to acknowledge the contributions of Red Hat for the information contained in this bulletin. _______________________________________________________________________________ CIAC, the Computer Incident Advisory Capability, is the computer security incident response team for the U.S. Department of Energy (DOE) and the emergency backup response team for the National Institutes of Health (NIH). CIAC is located at the Lawrence Livermore National Laboratory in Livermore, California. CIAC is also a founding member of FIRST, the Forum of Incident Response and Security Teams, a global organization established to foster cooperation and coordination among computer security teams worldwide. CIAC services are available to DOE, DOE contractors, and the NIH. CIAC can be contacted at: Voice: +1 925-422-8193 (7x24) FAX: +1 925-423-8002 STU-III: +1 925-423-2604 E-mail: ciac@ciac.org Previous CIAC notices, anti-virus software, and other information are available from the CIAC Computer Security Archive. World Wide Web: http://www.ciac.org/ Anonymous FTP: ftp.ciac.org PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing communities receive CIAC bulletins. If you are not part of these communities, please contact your agency's response team to report incidents. Your agency's team will coordinate with CIAC. The Forum of Incident Response and Security Teams (FIRST) is a world-wide organization. A list of FIRST member organizations and their constituencies can be obtained via WWW at http://www.first.org/. This document was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor the University of California nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation or favoring by the United States Government or the University of California. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or the University of California, and shall not be used for advertising or product endorsement purposes. LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC) Q-011: Vulnerability in DirectShow Could Allow Remote Code Execution Q-012: Cumulative Security Update for Internet Explorer Q-013: Vulnerabilities in Windows Shell Could Allow Remote Code Execution Q-014: Client Service for NetWare Could Allow Remote Code Execution Q-015: Vulnerability in Plug and Play Q-016: Ruby Q-017: Sun Java System Application Server May Disclose Source Code of Java Server Pages Q-018: VERITAS NetBackup Java User Interface Format String Vulnerability Q-019: Lynx Security Update Q-020: Multiple Security Vulnerabilities in Mozilla