First published: Wed Jun 06 2018(Updated: )
389-ds-base before versions 1.4.0.10, 1.3.8.3 is vulnerable to a race condition in the way 389-ds-base handles persistent search, resulting in a crash if the server is under load. An anonymous attacker could use this flaw to trigger a denial of service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/389-ds-base | <1.4.0.10 | 1.4.0.10 |
redhat/389-ds-base | <1.3.8.3 | 1.3.8.3 |
Fedoraproject 389 Directory Server | <1.4.0.10 | |
Debian Debian Linux | =8.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Eus | =7.5 | |
Redhat Enterprise Linux Server Eus | =7.6 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10850 is a vulnerability in 389-ds-base before versions 1.4.0.10 and 1.3.8.3.
The severity of CVE-2018-10850 is high with a severity value of 5.9.
CVE-2018-10850 could result in a race condition in 389-ds-base, causing a crash if the server is under load.
An anonymous attacker could trigger a denial of service by exploiting CVE-2018-10850.
To fix CVE-2018-10850, update to versions 1.4.0.10 or 1.3.8.3 of 389-ds-base.