First published: Fri Mar 23 2018(Updated: )
389-ds-base before versions 1.4.0.9, 1.3.8.1, 1.3.6.15 did not properly handle long search filters with characters needing escapes, possibly leading to buffer overflows. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/389-ds-base | <1.4.0.9 | 1.4.0.9 |
redhat/389-ds-base | <1.3.8.1 | 1.3.8.1 |
redhat/389-ds-base | <1.3.6.15 | 1.3.6.15 |
Fedoraproject 389 Directory Server | >=1.3.6.0<1.3.6.15 | |
Fedoraproject 389 Directory Server | >=1.4.0.0<1.4.0.9 | |
Fedoraproject 389 Directory Server | =1.3.8.1 | |
Fedoraproject 389 Directory Server | =1.3.8.2 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1089 is a vulnerability in 389-ds-base versions 1.4.0.9, 1.3.8.1, and 1.3.6.15 that could lead to buffer overflows.
CVE-2018-1089 could allow a remote, unauthenticated attacker to crash the ns-slapd service by sending a specially crafted LDAP request.
CVE-2018-1089 has a severity rating of 7.5 (high).
To fix CVE-2018-1089, update 389-ds-base to version 1.4.0.9, 1.3.8.1, or 1.3.6.15 depending on your installed version.
You can find more information about CVE-2018-1089 at the following references: [SecurityFocus](http://www.securityfocus.com/bid/104137), [Red Hat Security Advisory RHSA-2018:1364](https://access.redhat.com/errata/RHSA-2018:1364), [Red Hat Security Advisory RHSA-2018:1380](https://access.redhat.com/errata/RHSA-2018:1380).