First published: Thu Sep 06 2018(Updated: )
A flaw was found in 389-ds-base before version 1.3.8.4-13. The process ns-slapd crashes in delete_passwdPolicy function when persistent search connections are terminated unexpectedly leading to remote denial of service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fedoraproject 389 Directory Server | <1.3.8.4 | |
Redhat Enterprise Linux Aus | =7.6 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Eus | =7.5 | |
Redhat Enterprise Linux Server Eus | =7.6 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-14638.
The severity of CVE-2018-14638 is high (7.5).
The affected software includes 389-ds-base before version 1.3.8.4-13 on Red Hat Enterprise Linux and Fedora Directory Server.
CVE-2018-14638 can lead to remote denial of service when persistent search connections are terminated unexpectedly.
CVE-2018-14638 can be fixed by updating to version 1.4.0.17 of 389-ds-base.