First published: Tue Jul 03 2012(Updated: )
The acllas__handle_group_entry function in servers/plugins/acl/acllas.c in 389 Directory Server before 1.2.10 does not properly handled access control instructions (ACIs) that use certificate groups, which allows remote authenticated LDAP users with a certificate group to cause a denial of service (infinite loop and CPU consumption) by binding to the server.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat 389 Directory Server | <=1.2.10 | |
Red Hat 389 Directory Server | =1.2.1 | |
Red Hat 389 Directory Server | =1.2.2 | |
Red Hat 389 Directory Server | =1.2.3 | |
Red Hat 389 Directory Server | =1.2.5 | |
Red Hat 389 Directory Server | =1.2.5-rc1 | |
Red Hat 389 Directory Server | =1.2.5-rc2 | |
Red Hat 389 Directory Server | =1.2.5-rc3 | |
Red Hat 389 Directory Server | =1.2.5-rc4 | |
Red Hat 389 Directory Server | =1.2.6 | |
Red Hat 389 Directory Server | =1.2.6-a2 | |
Red Hat 389 Directory Server | =1.2.6-a3 | |
Red Hat 389 Directory Server | =1.2.6-a4 | |
Red Hat 389 Directory Server | =1.2.6-rc1 | |
Red Hat 389 Directory Server | =1.2.6-rc2 | |
Red Hat 389 Directory Server | =1.2.6-rc3 | |
Red Hat 389 Directory Server | =1.2.6-rc6 | |
Red Hat 389 Directory Server | =1.2.6-rc7 | |
Red Hat 389 Directory Server | =1.2.6.1 | |
Red Hat 389 Directory Server | =1.2.7-alpha3 | |
Red Hat 389 Directory Server | =1.2.7.5 | |
Red Hat 389 Directory Server | =1.2.8-alpha1 | |
Red Hat 389 Directory Server | =1.2.8-alpha2 | |
Red Hat 389 Directory Server | =1.2.8-alpha3 | |
Red Hat 389 Directory Server | =1.2.8-rc1 | |
Red Hat 389 Directory Server | =1.2.8-rc2 | |
Red Hat 389 Directory Server | =1.2.8.1 | |
Red Hat 389 Directory Server | =1.2.8.2 | |
Red Hat 389 Directory Server | =1.2.8.3 | |
Red Hat 389 Directory Server | =1.2.9.9 | |
Red Hat 389 Directory Server | =1.2.10-alpha8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0833 is classified as a denial of service vulnerability in the 389 Directory Server.
To fix CVE-2012-0833, you should upgrade 389 Directory Server to version 1.2.10 or later.
CVE-2012-0833 affects 389 Directory Server versions prior to 1.2.10.
Yes, CVE-2012-0833 can be exploited remotely by authenticated LDAP users leveraging certificate groups.
CVE-2012-0833 can lead to a denial of service, causing disruptions in the 389 Directory Server operations.