EulerOS 2.0 SP2 : 389-ds-base (EulerOS-SA-2018-1190)

Medium Nessus Plugin ID 110854


The remote EulerOS host is missing multiple security updates.


According to the versions of the 389-ds-base packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :

- It was found that 389-ds-base did not properly handle long search filters with characters needing escapes, possibly leading to buffer overflows. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.(CVE-2018-1089)

- It was found that the uniqueness_entry_to_config() function, used by the 'attribute uniqueness' plugin of 389 Directory Server, did not properly NULL terminate an array used in some configuration. An authenticated, or possibly unauthenticated, attacker could use this flaw to force an out-of-bound heap memory read, possibly triggering a crash of the LDAP service.(CVE-2017-2591)

Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected 389-ds-base packages.

See Also

Plugin Details

Severity: Medium

ID: 110854

File Name: EulerOS_SA-2018-1190.nasl

Version: 1.5

Type: local

Published: 2018/07/03

Updated: 2019/06/28

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS v3.0

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: p-cpe:/a:huawei:euleros:389-ds-base, p-cpe:/a:huawei:euleros:389-ds-base-libs, cpe:/o:huawei:euleros:2.0

Required KB Items: Host/local_checks_enabled, Host/EulerOS/release, Host/EulerOS/rpm-list, Host/EulerOS/sp

Excluded KB Items: Host/EulerOS/uvp_version

Patch Publication Date: 2018/06/18

Reference Information

CVE: CVE-2017-2591, CVE-2018-1089