First published: Mon Aug 19 2019(Updated: )
USN-4078-1 fixed several vulnerabilities in openldap. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. Original advisory details: It was discovered that OpenLDAP incorrectly handled rootDN delegation. A database administrator could use this issue to request authorization as an identity from another database, contrary to expectations. (CVE-2019-13057) It was discovered that OpenLDAP incorrectly handled SASL authentication and session encryption. After a first SASL bind was completed, it was possible to obtain access by performing simple binds, contrary to expectations. (CVE-2019-13565)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/slapd | <2.4.31-1+nmu2ubuntu8.5+esm1 | 2.4.31-1+nmu2ubuntu8.5+esm1 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/slapd | <2.4.28-1.1ubuntu4.9 | 2.4.28-1.1ubuntu4.9 |
Ubuntu OpenSSH Client | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this advisory is USN-4078-2.
OpenLDAP version 2.4.31-1+nmu2ubuntu8.5+esm1 is affected on Ubuntu 14.04, and OpenLDAP version 2.4.28-1.1ubuntu4.9 is affected on Ubuntu 12.04.
The severity of the vulnerabilities is not specified in the advisory.
To fix the OpenLDAP vulnerabilities, update the package to the latest version provided in the Ubuntu security advisory USN-4078-2.
You can find more information about the vulnerabilities in the Ubuntu security advisories USN-4078-1, CVE-2019-13057, and CVE-2019-13565.