First published: Fri Jul 25 2014(Updated: )
IssueDescription: It was found that when replication was enabled for each attribute in Red Hat Directory Server / 389 Directory Server, which is the default configuration, the server returned replicated metadata when the directory was searched while debugging was enabled. A remote attacker could use this flaw to disclose potentially sensitive information. Acknowledgements: This issue was discovered by Ludwig Krispenz of Red Hat.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat 389 Directory Server | =1.2.1 | |
Red Hat 389 Directory Server | =1.2.2 | |
Red Hat 389 Directory Server | =1.2.3 | |
Red Hat 389 Directory Server | =1.2.5 | |
Red Hat 389 Directory Server | =1.2.5-rc1 | |
Red Hat 389 Directory Server | =1.2.5-rc2 | |
Red Hat 389 Directory Server | =1.2.5-rc3 | |
Red Hat 389 Directory Server | =1.2.5-rc4 | |
Red Hat 389 Directory Server | =1.2.6 | |
Red Hat 389 Directory Server | =1.2.6-a2 | |
Red Hat 389 Directory Server | =1.2.6-a3 | |
Red Hat 389 Directory Server | =1.2.6-a4 | |
Red Hat 389 Directory Server | =1.2.6-rc1 | |
Red Hat 389 Directory Server | =1.2.6-rc2 | |
Red Hat 389 Directory Server | =1.2.6-rc3 | |
Red Hat 389 Directory Server | =1.2.6-rc6 | |
Red Hat 389 Directory Server | =1.2.6-rc7 | |
Red Hat 389 Directory Server | =1.2.6.1 | |
Red Hat 389 Directory Server | =1.2.7-alpha3 | |
Red Hat 389 Directory Server | =1.2.7.5 | |
Red Hat 389 Directory Server | =1.2.8-alpha1 | |
Red Hat 389 Directory Server | =1.2.8-alpha2 | |
Red Hat 389 Directory Server | =1.2.8-alpha3 | |
Red Hat 389 Directory Server | =1.2.8-rc1 | |
Red Hat 389 Directory Server | =1.2.8-rc2 | |
Red Hat 389 Directory Server | =1.2.8.1 | |
Red Hat 389 Directory Server | =1.2.8.2 | |
Red Hat 389 Directory Server | =1.2.8.3 | |
Red Hat 389 Directory Server | =1.2.9.9 | |
Red Hat 389 Directory Server | =1.2.10 | |
Red Hat 389 Directory Server | =1.2.10-alpha8 | |
Red Hat 389 Directory Server | =1.2.10-rc1 | |
Red Hat 389 Directory Server | =1.2.10.2 | |
Red Hat 389 Directory Server | =1.2.10.3 | |
Red Hat 389 Directory Server | =1.2.10.4 | |
Red Hat 389 Directory Server | =1.2.10.11 | |
Red Hat 389 Directory Server | =1.2.11.1 | |
Red Hat 389 Directory Server | =1.2.11.5 | |
Red Hat 389 Directory Server | =1.2.11.6 | |
Red Hat 389 Directory Server | =1.2.11.8 | |
Red Hat 389 Directory Server | =1.2.11.9 | |
Red Hat 389 Directory Server | =1.2.11.10 | |
Red Hat 389 Directory Server | =1.2.11.11 | |
Red Hat 389 Directory Server | =1.2.11.12 | |
Red Hat 389 Directory Server | =1.2.11.13 | |
Red Hat 389 Directory Server | =1.2.11.14 | |
Red Hat 389 Directory Server | =1.2.11.15 | |
Red Hat 389 Directory Server | =1.2.11.17 | |
Red Hat 389 Directory Server | =1.2.11.19 | |
Red Hat 389 Directory Server | =1.2.11.20 | |
Red Hat 389 Directory Server | =1.2.11.21 | |
Red Hat 389 Directory Server | =1.2.11.22 | |
Red Hat 389 Directory Server | =1.2.11.23 | |
Red Hat 389 Directory Server | =1.2.11.25 | |
Red Hat 389 Directory Server | =1.2.11.26 | |
Red Hat 389 Directory Server | =1.3.0.2 | |
Red Hat 389 Directory Server | =1.3.0.3 | |
Red Hat 389 Directory Server | =1.3.0.4 | |
Red Hat 389 Directory Server | =1.3.0.5 | |
Red Hat 389 Directory Server | =1.3.0.6 | |
Red Hat 389 Directory Server | =1.3.0.7 | |
Red Hat 389 Directory Server | =1.3.0.8 | |
Red Hat Directory Server | =8.0 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3562 has a medium severity rating due to potential unauthorized access to sensitive replicated metadata.
To fix CVE-2014-3562, update your Red Hat Directory Server to the latest version that includes the security patches for this vulnerability.
CVE-2014-3562 affects Red Hat Directory Server versions 1.2.1 through 1.2.10.4 and 1.3.0.2 through 1.3.0.8.
Yes, CVE-2014-3562 can be exploited remotely by an attacker if debugging is enabled.
An attacker exploiting CVE-2014-3562 could gain access to sensitive replicated metadata during directory searches.