First published: Wed Aug 13 2008(Updated: )
Multiple memory leaks in Red Hat Directory Server 7.1 before SP7, Red Hat Directory Server 8, and Fedora Directory Server 1.1.1 and earlier allow remote attackers to cause a denial of service (memory consumption) via vectors involving (1) the authentication / bind phase and (2) anonymous LDAP search requests.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat 389 Directory Server | =1.1.1 | |
Red Hat Directory Server | =7.1-sp1 | |
Red Hat Directory Server | =7.1-sp2 | |
Red Hat Directory Server | =7.1-sp3 | |
Red Hat Directory Server | =7.1-sp4 | |
Red Hat Directory Server | =7.1-sp5 | |
Red Hat Directory Server | =7.1-sp6 | |
Red Hat Directory Server | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3283 has a moderate severity level due to its potential for causing denial of service through memory consumption.
To remediate CVE-2008-3283, upgrade to Red Hat Directory Server 7.1 SP7 or later, or to Red Hat Directory Server 8.
CVE-2008-3283 can be exploited through remote attacks targeting the authentication/bind phase and anonymous LDAP searches.
CVE-2008-3283 affects Red Hat Directory Server 7.1 before SP7, Red Hat Directory Server 8, and Fedora Directory Server 1.1.1 and earlier.
The impact of CVE-2008-3283 is a denial of service caused by memory leaks that lead to excessive memory consumption.