Low CentOS openldap Update

Metadata

low
unknown
openldap-2.4.23-26.el6_3.2.i686.rpm, openldap-2.4.23-26.el6_3.2.src.rpm, openldap-2.4.23-26.el6_3.2.x86_64.rpm, openldap-clients-2.4.23-26.el6_3.2.i686.rpm, openldap-clients-2.4.23-26.el6_3.2.x86_64.rpm, openldap-devel-2.4.23-26.el6_3.2.i686.rpm, openldap-devel-2.4.23-26.el6_3.2.x86_64.rpm, openldap-servers-2.4.23-26.el6_3.2.i686.rpm, openldap-servers-2.4.23-26.el6_3.2.x86_64.rpm, openldap-servers-sql-2.4.23-26.el6_3.2.i686.rpm, openldap-servers-sql-2.4.23-26.el6_3.2.x86_64.rpm
rhn.redhat.com, lists.centos.org
2012-08-08
2017-07-27 20:03
2017-07-27 19:03
2017-04-01 19:06
2017-01-05 20:10

Description


Updated openldap packages that fix one security issue and one bug are now
available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

OpenLDAP is an open source suite of LDAP (Lightweight Directory Access
Protocol) applications and development tools.

It was found that the OpenLDAP server daemon ignored olcTLSCipherSuite
settings. This resulted in the default cipher suite always being used,
which could lead to weaker than expected ciphers being accepted during
Transport Layer Security (TLS) negotiation with OpenLDAP clients.
(CVE-2012-2668)

This update also fixes the following bug:

* When the smbk5pwd overlay was enabled in an OpenLDAP server, and a user
changed their password, the Microsoft NT LAN Manager (NTLM) and Microsoft
LAN Manager (LM) hashes were not computed correctly. This led to the
sambaLMPassword and sambaNTPassword attributes being updated with incorrect
values, preventing the user logging in using a Windows-based client or a
Samba client.

With this update, the smbk5pwd overlay is linked against OpenSSL. As such,
the NTLM and LM hashes are computed correctly, and password changes work as
expected when using smbk5pwd. (BZ#844428)

Users of OpenLDAP are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. After installing this
update, the OpenLDAP daemons will be restarted automatically.
Please see https://www.redhat.com/footer/terms-of-use.html

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
6 openldap openldap-2.4.23-26.el6_3.2.i686.rpm
openldap openldap-2.4.23-26.el6_3.2.src.rpm
openldap openldap-2.4.23-26.el6_3.2.x86_64.rpm
openldap-clients openldap-clients-2.4.23-26.el6_3.2.i686.rpm
openldap-clients openldap-clients-2.4.23-26.el6_3.2.x86_64.rpm
openldap-devel openldap-devel-2.4.23-26.el6_3.2.i686.rpm
openldap-devel openldap-devel-2.4.23-26.el6_3.2.x86_64.rpm
openldap-servers openldap-servers-2.4.23-26.el6_3.2.i686.rpm
openldap-servers openldap-servers-2.4.23-26.el6_3.2.x86_64.rpm
openldap-servers-sql openldap-servers-sql-2.4.23-26.el6_3.2.i686.rpm
openldap-servers-sql openldap-servers-sql-2.4.23-26.el6_3.2.x86_64.rpm