First published: Fri Aug 02 2019(Updated: )
It was found that the fix for CVE-2018-14648 in 389-ds-base, versions 1.4.0.x before 1.4.0.17, was incorrectly applied in RHEL 7.5. An attacker would still be able to provoke excessive CPU consumption leading to a denial of service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat 389 Directory Server | >=1.4.0.0<1.4.0.17 | |
Red Hat Enterprise Linux Server | =7.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10171 has a medium severity level due to its potential to cause denial of service through excessive CPU consumption.
To fix CVE-2019-10171, upgrade 389-ds-base to version 1.4.0.17 or later on affected systems.
CVE-2019-10171 affects Red Hat Enterprise Linux Server EUS version 7.5 and 389 Directory Server versions before 1.4.0.17.
Yes, an attacker can exploit CVE-2019-10171 to cause excessive CPU consumption leading to a denial of service condition.
Yes, CVE-2019-10171 stems from a fix for CVE-2018-14648 that was incorrectly applied in certain versions.