First published: Tue Mar 28 2017(Updated: )
389-ds-base before versions 1.3.5.17 and 1.3.6.10 is vulnerable to an invalid pointer dereference in the way LDAP bind requests are handled. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/389-ds-base | <1.3.5.17 | 1.3.5.17 |
redhat/389-ds-base | <1.3.6.10 | 1.3.6.10 |
Red Hat 389 Directory Server | >=1.3.5.0<1.3.5.17 | |
Red Hat 389 Directory Server | >=1.3.6.0<1.3.6.10 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2668 is classified as a high severity vulnerability due to its potential to cause denial of service.
To mitigate CVE-2017-2668, upgrade to 389-ds-base version 1.3.5.17 or 1.3.6.10 or later.
CVE-2017-2668 affects users of 389-ds-base versions prior to 1.3.5.17 and 1.3.6.10.
CVE-2017-2668 can be exploited through a specially crafted LDAP bind request.
Exploitation of CVE-2017-2668 could result in the ns-slapd service crashing, leading to a denial of service.