Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 07 Aug 2014 12:12:27 -0600
From: "Vincent Danen" <>
To: "OSS Security List" <>
Subject: CVE-2014-3562: Vulnerability in 389-ds

This was initially sent to the distros list on August 5th:

It was found that when replication was enabled for each attribute in Red
Hat Directory Server / 389 Directory Server, which is the default
configuration, the server returned replicated metadata when the
directory was searched while debugging was enabled. A remote attacker
could use this flaw to disclose potentially sensitive information.


This issue was discovered by Ludwig Krispenz of Red Hat.

Further details can be found here:

Vincent Danen / Red Hat Product Security
Download attachment "signature.asc" of type "application/pgp-signature" (711 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ