First published: Wed Jan 19 2011(Updated: )
A flaw was found in the way that the Red Hat Directory Server handled simple paged result searches. If an unauthenticated user were able to send multiple simple paged search requests to Directory Server, it could cause the server to crash.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat 389 Directory Server | =1.2.7.5 | |
Red Hat Directory Server | =8.2 | |
Red Hat Directory Server | =8.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0019 is considered a high severity vulnerability due to the possibility of an unauthenticated user causing a crash in the directory server.
To fix CVE-2011-0019, it is recommended to update the Red Hat Directory Server to a version that contains the security patch.
CVE-2011-0019 affects Red Hat Directory Server versions 1.2.7.5, 8.2, and 8.2.3.
Yes, CVE-2011-0019 can be exploited remotely if an unauthenticated user sends multiple simple paged search requests.
CVE-2011-0019 can lead to a crash of the Red Hat Directory Server, impacting service availability.