First published: Mon May 28 2012(Updated: )
It was reported that OpenLDAP, when using the Mozilla NSS backend, would ignore any TLSCipherSuite configuration settings. When the TLSCipherSuite setting is configured, OpenLDAP would use the default cipher suite, ignoring the setting. While the default cipher suite contains some weak ciphers (e.g. MD5-based), it is still not easy to break the encryption to obtain sensitive information. However, if an administrator wishes to enforce the use of stronger ciphers by overriding the defaults using TLSCipherSuite, they should be able to trust that, when the configuration items is in place, the stronger ciphers are used. Due to this flaw, that is not the case.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenLDAP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-825875 is considered high due to the use of weak default ciphers.
To fix REDHAT-BUG-825875, update your OpenLDAP configuration to explicitly set the TLSCipherSuite parameter using a secure cipher.
REDHAT-BUG-825875 affects OpenLDAP installations that utilize the Mozilla NSS backend.
The risks associated with REDHAT-BUG-825875 include potential exposure to cryptographic vulnerabilities due to weak ciphers.
A temporary workaround for REDHAT-BUG-825875 is to manually override the default cipher suite settings until a patch is applied.