Amazon Linux AMI : 389-ds-base Privilege Vulnerability (ALAS-2013-184)

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.


Synopsis :

The remote Amazon Linux AMI host is missing a security update.

Description :

The 389 Directory Server is an LDAPv3 compliant server. The base
packages include the Lightweight Directory Access Protocol (LDAP)
server and command-line utilities for server administration. It was
found that the 389 Directory Server did not properly restrict access
to entries when the 'nsslapd-allow-anonymous-access' configuration
setting was set to 'rootdse'. An anonymous user could connect to the
LDAP database and, if the search scope is set to BASE, obtain access
to information outside of the rootDSE. (CVE-2013-1897)

See also :

http://www.nessus.org/u?0be14f60

Solution :

Run 'yum update 389-ds-base' to update your system.

Risk factor :

Low / CVSS Base Score : 2.6
(CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)

Family: Amazon Linux Local Security Checks

Nessus Plugin ID: 69743 ()

Bugtraq ID:

CVE ID: CVE-2013-1897