MGASA-2017-0340

Source
https://advisories.mageia.org/MGASA-2017-0340.html
Import Source
https://advisories.mageia.org/MGASA-2017-0340.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2017-0340
Upstream
Published
2017-09-16T08:24:57Z
Modified
2026-04-16T06:25:09.663026077Z
Summary
Updated 389-ds-base packages fix security vulnerability
Details

The directory server password lockout policy prevents binds from operating once a threshold of failed passwords has been met. During this lockout, if you bind with a successful password, a different error code is returned. This means that an attacker has no ratelimit or penalty during an account lock, and can continue to attempt passwords via bruteforce, using the change in return code to ascertain a sucessful password auth (CVE-2017-7551).

References
Credits

Affected packages

Mageia:5 / 389-ds-base

Package

Name
389-ds-base
Purl
pkg:rpm/mageia/389-ds-base?arch=source&distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.4.14-1.3.mga5

Ecosystem specific

{
    "section": "core"
}

Database specific

source
"https://advisories.mageia.org/MGASA-2017-0340.json"

Mageia:6 / 389-ds-base

Package

Name
389-ds-base
Purl
pkg:rpm/mageia/389-ds-base?arch=source&distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.5.17-1.1.mga6

Ecosystem specific

{
    "section": "core"
}

Database specific

source
"https://advisories.mageia.org/MGASA-2017-0340.json"