First published: Wed Sep 19 2018(Updated: )
A flaw was found in 389 Directory Server. A specially crafted search query could lead to excessive CPU consumption in the do_search() function. An unauthenticated attacker could use this flaw to provoke a denial of service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fedoraproject 389 Directory Server | <1.4.0.17 | |
Debian Debian Linux | =8.0 | |
Redhat Enterprise Linux | =7.0 | |
redhat/389-ds-base | <1.4.0.18 | 1.4.0.18 |
redhat/389-ds-base | <1.3.8.10 | 1.3.8.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14648 is a vulnerability in 389 Directory Server that allows an unauthenticated attacker to trigger a denial of service by sending a specially crafted search query, leading to excessive CPU consumption.
CVE-2018-14648 affects the do_search() function in 389 Directory Server, causing excessive CPU consumption and potentially leading to a denial of service.
The severity of CVE-2018-14648 is high, with a CVSS score of 7.5.
CVE-2018-14648 affects 389 Directory Server versions up to 1.4.0.18 and 1.3.8.10.
To fix CVE-2018-14648, upgrade to 389 Directory Server version 1.4.0.18 or apply the recommended patches.