First published: Wed Feb 23 2011(Updated: )
slapd (aka ns-slapd) in 389 Directory Server before 1.2.8.a2 does not properly manage the c_timelimit field of the connection table element, which allows remote attackers to cause a denial of service (daemon outage) via Simple Paged Results connections, as demonstrated by using multiple processes to replay TCP sessions, a different vulnerability than CVE-2011-0019.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat 389 Directory Server | <=1.2.8 | |
Red Hat 389 Directory Server | =1.2.1 | |
Red Hat 389 Directory Server | =1.2.2 | |
Red Hat 389 Directory Server | =1.2.3 | |
Red Hat 389 Directory Server | =1.2.5 | |
Red Hat 389 Directory Server | =1.2.5-rc1 | |
Red Hat 389 Directory Server | =1.2.5-rc2 | |
Red Hat 389 Directory Server | =1.2.5-rc3 | |
Red Hat 389 Directory Server | =1.2.5-rc4 | |
Red Hat 389 Directory Server | =1.2.6 | |
Red Hat 389 Directory Server | =1.2.6-a2 | |
Red Hat 389 Directory Server | =1.2.6-a3 | |
Red Hat 389 Directory Server | =1.2.6-a4 | |
Red Hat 389 Directory Server | =1.2.6-rc1 | |
Red Hat 389 Directory Server | =1.2.6-rc2 | |
Red Hat 389 Directory Server | =1.2.6-rc3 | |
Red Hat 389 Directory Server | =1.2.6-rc6 | |
Red Hat 389 Directory Server | =1.2.6-rc7 | |
Red Hat 389 Directory Server | =1.2.6.1 | |
Red Hat 389 Directory Server | =1.2.7-alpha3 | |
Red Hat 389 Directory Server | =1.2.7.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2011-1067 is classified as high due to its potential to cause a denial of service.
To fix CVE-2011-1067, upgrade to 389 Directory Server version 1.2.8 or later, which includes a patch for this vulnerability.
CVE-2011-1067 allows attackers to exploit the connection table, leading to potential downtime or service disruption.
Yes, CVE-2011-1067 can be exploited remotely through Simple Paged Results connections.
CVE-2011-1067 affects all versions of 389 Directory Server before 1.2.8.