First published: Fri Jan 05 2018(Updated: )
A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5 handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/389-ds-base | <1.3.6.13 | 1.3.6.13 |
redhat/389-ds-base | <1.3.7.9 | 1.3.7.9 |
redhat/389-ds-base | <1.4.0.5 | 1.4.0.5 |
Red Hat 389 Directory Server | >=1.3.6.1<1.3.6.13 | |
Red Hat 389 Directory Server | >=1.3.7.1<1.3.7.9 | |
Red Hat 389 Directory Server | >=1.4.0.0<1.4.0.5 | |
Red Hat Enterprise Linux | =7.4 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15134 has been classified as a critical vulnerability due to its potential for remote exploitation.
To mitigate CVE-2017-15134, upgrade the 389-ds-base package to version 1.3.6.13 or later.
An attacker could exploit CVE-2017-15134 to cause a denial of service by crashing the ns-slapd process.
CVE-2017-15134 affects 389-ds-base versions prior to 1.3.6.13, 1.3.7.9, and 1.4.0.5.
No, CVE-2017-15134 can be exploited by remote, unauthenticated attackers.