First published: Tue Aug 16 2022(Updated: )
A flaw was found In 389-ds-base. When the Content Synchronization plugin is enabled, an authenticated user can reach a NULL pointer dereference using a specially crafted query. This flaw allows an authenticated attacker to cause a denial of service. This CVE is assigned against an incomplete fix of CVE-2021-3514.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Directory Server | =11.0 | |
Redhat Directory Server | =12.0 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Port389 389-ds-base | >=2.0.0<=2.4.1 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2850 is a vulnerability found in 389-ds-base that allows an authenticated attacker to cause a denial of service.
The severity of CVE-2022-2850 is medium with a severity value of 6.5.
CVE-2022-2850 affects Redhat Directory Server versions 11.0 and 12.0, Redhat Enterprise Linux versions 6.0, 7.0, 8.0, and 9.0, Fedora versions 35 and 36, and Port389 389-ds-base versions between 2.0.0 and 2.4.1.
An authenticated attacker can exploit CVE-2022-2850 by using a specially crafted query to cause a NULL pointer dereference and trigger a denial of service.
Yes, you can find references for CVE-2022-2850 at the following links: [link1](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1952907), [link2](https://github.com/389ds/389-ds-base/blob/main/dirsrvtests/tests/tickets/ticket48013_test.py), [link3](https://github.com/389ds/389-ds-base/issues/4711#issuecomment-1205100979).