First published: Wed Feb 23 2011(Updated: )
Multiple memory leaks in the normalization functionality in 389 Directory Server before 1.2.7.5 allow remote attackers to cause a denial of service (memory consumption) via "badly behaved applications," related to (1) Slapi_Attr mishandling in the DN normalization code and (2) pointer mishandling in the syntax normalization code, a different issue than CVE-2011-0019.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat 389 Directory Server | <=1.2.7 | |
Red Hat 389 Directory Server | =1.2.1 | |
Red Hat 389 Directory Server | =1.2.2 | |
Red Hat 389 Directory Server | =1.2.3 | |
Red Hat 389 Directory Server | =1.2.5 | |
Red Hat 389 Directory Server | =1.2.5-rc1 | |
Red Hat 389 Directory Server | =1.2.5-rc2 | |
Red Hat 389 Directory Server | =1.2.5-rc3 | |
Red Hat 389 Directory Server | =1.2.5-rc4 | |
Red Hat 389 Directory Server | =1.2.6 | |
Red Hat 389 Directory Server | =1.2.6-a2 | |
Red Hat 389 Directory Server | =1.2.6-a3 | |
Red Hat 389 Directory Server | =1.2.6-a4 | |
Red Hat 389 Directory Server | =1.2.6-rc1 | |
Red Hat 389 Directory Server | =1.2.6-rc2 | |
Red Hat 389 Directory Server | =1.2.6-rc3 | |
Red Hat 389 Directory Server | =1.2.6-rc6 | |
Red Hat 389 Directory Server | =1.2.6-rc7 | |
Red Hat 389 Directory Server | =1.2.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4746 has been classified as a denial of service vulnerability due to multiple memory leaks.
To mitigate CVE-2010-4746, upgrading to version 1.2.7.5 or later of 389 Directory Server is recommended.
CVE-2010-4746 affects 389 Directory Server versions up to and including 1.2.7.
CVE-2010-4746 is caused by memory leaks in the normalization functionality of 389 Directory Server.
Yes, CVE-2010-4746 can be exploited remotely by attackers using badly behaved applications.