nss_ldap: Information disclosure — GLSA 200711-33

A race condition might lead to theft of user credentials or information disclosure in services using nss_ldap.

Affected packages

sys-auth/nss_ldap on all architectures
Affected versions < 258
Unaffected versions >= 258

Background

nss_ldap is a Name Service Switch module which allows 'passwd', 'group' and 'host' database information to be pulled from LDAP.

Description

Josh Burley reported that nss_ldap does not properly handle the LDAP connections due to a race condition that can be triggered by multi-threaded applications using nss_ldap, which might lead to requested data being returned to a wrong process.

Impact

Remote attackers could exploit this race condition by sending queries to a vulnerable server using nss_ldap, possibly leading to theft of user credentials or information disclosure (e.g. Dovecot returning wrong mailbox contents).

Workaround

There is no known workaround at this time.

Resolution

All nss_ldap users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-auth/nss_ldap-258"

References

Release date
November 25, 2007

Latest revision
November 25, 2007: 01

Severity
low

Exploitable
remote

Bugzilla entries