First published: Mon Jan 22 2018(Updated: )
An out-of-bounds memory read flaw was found in the way 389-ds-base handled certain LDAP search filters, affecting all versions including 1.4.x. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/389-ds-base | <1.3.6.14 | 1.3.6.14 |
redhat/389-ds-base | <1.3.7.10 | 1.3.7.10 |
redhat/389-ds-base | <1.4.0.6 | 1.4.0.6 |
Fedoraproject 389 Directory Server | <=1.4.0.6 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server | =7.4 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw is CVE-2018-1054.
The out-of-bounds memory read flaw affects all versions of 389-ds-base including 1.4.x.
CVE-2018-1054 has a severity rating of 7.5 out of 10.
CVE-2018-1054 affects versions 1.3.6.14 up to 1.4.0.6 of 389-ds-base.
An attacker can exploit this vulnerability by sending a specially crafted LDAP request, causing ns-slapd to crash.