First published: Wed Aug 21 2013(Updated: )
ns-slapd in 389 Directory Server before 1.3.0.8 allows remote attackers to cause a denial of service (server crash) via a crafted Distinguished Name (DN) in a MOD operation request.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat 389 Directory Server | <=1.3.0.7 | |
Red Hat 389 Directory Server | =1.3.0.2 | |
Red Hat 389 Directory Server | =1.3.0.3 | |
Red Hat 389 Directory Server | =1.3.0.4 | |
Red Hat 389 Directory Server | =1.3.0.5 | |
Red Hat 389 Directory Server | =1.3.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4283 has a severity rating that indicates it can lead to a denial of service condition.
To fix CVE-2013-4283, update the 389 Directory Server to version 1.3.0.8 or later.
CVE-2013-4283 affects users of 389 Directory Server versions before 1.3.0.8.
CVE-2013-4283 enables remote attackers to cause a crash of the server through crafted input.
Yes, CVE-2013-4283 is exploitative as it can be triggered by sending specially crafted requests to the server.