First published: Wed Feb 23 2011(Updated: )
slapd (aka ns-slapd) in 389 Directory Server before 1.2.8.a2 does not properly manage the c_timelimit field of the connection table element, which allows remote attackers to cause a denial of service (daemon outage) via Simple Paged Results connections, as demonstrated by using multiple processes to replay TCP sessions, a different vulnerability than CVE-2011-0019.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fedoraproject 389 Directory Server | =1.2.5-rc4 | |
Fedoraproject 389 Directory Server | =1.2.3 | |
Fedoraproject 389 Directory Server | =1.2.5-rc1 | |
Fedoraproject 389 Directory Server | =1.2.6-rc3 | |
Fedoraproject 389 Directory Server | =1.2.6-a3 | |
Fedoraproject 389 Directory Server | =1.2.6-rc1 | |
Fedoraproject 389 Directory Server | <=1.2.8 | |
Fedoraproject 389 Directory Server | =1.2.7.5 | |
Fedoraproject 389 Directory Server | =1.2.1 | |
Fedoraproject 389 Directory Server | =1.2.2 | |
Fedoraproject 389 Directory Server | =1.2.5 | |
Fedoraproject 389 Directory Server | =1.2.6-rc6 | |
Fedoraproject 389 Directory Server | =1.2.6.1 | |
Fedoraproject 389 Directory Server | =1.2.5-rc3 | |
Fedoraproject 389 Directory Server | =1.2.6-a4 | |
Fedoraproject 389 Directory Server | =1.2.5-rc2 | |
Fedoraproject 389 Directory Server | =1.2.6-rc2 | |
Fedoraproject 389 Directory Server | =1.2.6-a2 | |
Fedoraproject 389 Directory Server | =1.2.6 | |
Fedoraproject 389 Directory Server | =1.2.6-rc7 | |
Fedoraproject 389 Directory Server | =1.2.7-alpha3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.