Scientific Linux Security Update : ipa and slapi-nis on SL7.x x86_64

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote Scientific Linux host is missing one or more security
updates.

Description :

The ipa component provides centrally managed Identity, Policy, and
Audit. The slapi-nis component provides NIS Server and Schema
Compatibility plug- ins for Directory Server.

It was discovered that the IPA extdom Directory Server plug-in did not
correctly perform memory reallocation when handling user account
information. A request for a list of groups for a user that belongs to
a large number of groups would cause a Directory Server to crash.
(CVE-2015-1827)

It was discovered that the slapi-nis Directory Server plug-in did not
correctly perform memory reallocation when handling user account
information. A request for information about a group with many
members, or a request for a user that belongs to a large number of
groups, would cause a Directory Server to enter an infinite loop and
consume an excessive amount of CPU time. (CVE-2015-0283)

This update fixes the following bugs :

- Previously, users of IdM were not properly granted the
default permission to read the
'facsimiletelephonenumber' user attribute. This update
adds 'facsimiletelephonenumber' to the Access Control
Instruction (ACI) for user data, which makes the
attribute readable to authenticated users as expected.

- Prior to this update, when a DNS zone was saved in an
LDAP database without a dot character (.) at the end,
internal DNS commands and operations, such as
dnsrecord-* or dnszone-*, failed. With this update, DNS
commands always supply the DNS zone with a dot character
at the end, which prevents the described problem.

- After a full-server IdM restore operation, the restored
server in some cases contained invalid data. In
addition, if the restored server was used to
reinitialize a replica, the replica then contained
invalid data as well. To fix this problem, the IdM API
is now created correctly during the restore operation,
and *.ldif files are not skipped during the removal of
RUV data. As a result, the restored server and its
replica no longer contain invalid data.

- Previously, a deadlock in some cases occurred during an
IdM upgrade, which could cause the IdM server to become
unresponsive. With this update, the Schema Compatibility
plug-in has been adjusted not to parse the subtree that
contains the configuration of the DNA plug-in, which
prevents this deadlock from triggering.

- When using the extdom plug-in of IdM to handle large
groups, user lookups and group lookups previously failed
due to insufficient buffer size. With this update, the
getgrgid_r() call gradually increases the buffer length
if needed, and the described failure of extdom thus no
longer occurs.

See also :

http://www.nessus.org/u?68860c92

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 82293 ()

Bugtraq ID:

CVE ID: CVE-2015-0283
CVE-2015-1827

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now