<?xml version="1.0" encoding="utf-8"?> <!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> <glsa id="200711-33"> <title>nss_ldap: Information disclosure</title> <synopsis> A race condition might lead to theft of user credentials or information disclosure in services using nss_ldap. </synopsis> <product type="ebuild">nss_ldap</product> <announced>2007-11-25</announced> <revised count="01">2007-11-25</revised> <bug>198390</bug> <access>remote</access> <affected> <package name="sys-auth/nss_ldap" auto="yes" arch="*"> <unaffected range="ge">258</unaffected> <vulnerable range="lt">258</vulnerable> </package> </affected> <background> <p> nss_ldap is a Name Service Switch module which allows 'passwd', 'group' and 'host' database information to be pulled from LDAP. </p> </background> <description> <p> Josh Burley reported that nss_ldap does not properly handle the LDAP connections due to a race condition that can be triggered by multi-threaded applications using nss_ldap, which might lead to requested data being returned to a wrong process. </p> </description> <impact type="low"> <p> Remote attackers could exploit this race condition by sending queries to a vulnerable server using nss_ldap, possibly leading to theft of user credentials or information disclosure (e.g. Dovecot returning wrong mailbox contents). </p> </impact> <workaround> <p> There is no known workaround at this time. </p> </workaround> <resolution> <p> All nss_ldap users should upgrade to the latest version: </p> <code> # emerge --sync # emerge --ask --oneshot --verbose ">=sys-auth/nss_ldap-258"</code> </resolution> <references> <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5794">CVE-2007-5794</uri> </references> <metadata tag="requester" timestamp="2007-11-18T15:50:09Z"> p-y </metadata> <metadata tag="bugReady" timestamp="2007-11-18T15:50:16Z"> p-y </metadata> <metadata tag="submitter" timestamp="2007-11-21T00:25:43Z"> rbu </metadata> </glsa>