First published: Fri Jan 05 2018(Updated: )
A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5 handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fedoraproject 389 Directory Server | >=1.3.6.1<1.3.6.13 | |
Fedoraproject 389 Directory Server | >=1.3.7.1<1.3.7.9 | |
Fedoraproject 389 Directory Server | >=1.4.0.0<1.4.0.5 | |
Redhat Enterprise Linux | =7.4 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server | =7.4 | |
Redhat Enterprise Linux Workstation | =7.0 | |
redhat/389-ds-base | <1.3.6.13 | 1.3.6.13 |
redhat/389-ds-base | <1.3.7.9 | 1.3.7.9 |
redhat/389-ds-base | <1.4.0.5 | 1.4.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.