First published: Sat Nov 23 2013(Updated: )
389 Directory Server 1.2.11.15 (aka Red Hat Directory Server before 8.2.11-14) allows remote authenticated users to cause a denial of service (crash) via multiple @ characters in a GER attribute list in a search request.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | =6.0 | |
Red Hat 389 Directory Server | =1.2.11.15 | |
Red Hat Directory Server | <=8.2 | |
Red Hat Directory Server | =7.1 | |
Red Hat Directory Server | =8.0 | |
Red Hat Directory Server | =8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4485 is classified as a denial of service vulnerability that can lead to a crash.
To mitigate CVE-2013-4485, update to the patched versions of Red Hat Directory Server as recommended in available advisories.
CVE-2013-4485 impacts users of 389 Directory Server 1.2.11.15 and earlier versions on Red Hat Enterprise Linux 6.0 and other specified versions.
CVE-2013-4485 allows remote authenticated users to exploit the server by sending specially crafted requests containing multiple @ characters.
CVE-2013-4485 was published in 2013, highlighting a significant vulnerability in certain Red Hat Directory Server versions.