CWE
122 119
Advisory Published
CVE Published
Updated

CVE-2024-1062: 389-ds-base: a heap overflow leading to denail-of-servce while writing a value larger than 256 chars (in log_entry_attr)

First published: Tue Jan 30 2024(Updated: )

A heap overflow flaw was found in 389-ds-base. This issue leads to a denial of service when writing a value larger than 256 chars in log_entry_attr.

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
redhat/389-ds-base<2.2.0
2.2.0
Red Hat 389 Directory Server<2.2.0
Red Hat Directory Server
Red Hat Directory Server=11.7
Red Hat Directory Server=11.8
Fedora=39
Fedora=40
Fedora=41
All of
Red Hat Directory Server=12.0
redhat enterprise Linux eus=9.2
Red Hat Enterprise Linux=8.0
redhat enterprise Linux eus=8.6
redhat enterprise Linux eus=8.8
redhat enterprise Linux eus=9.2
Red Hat Enterprise Linux for ARM64 EUS=8.6
Red Hat Enterprise Linux for ARM64 EUS=8.8
Red Hat Enterprise Linux for ARM64 EUS=9.2
redhat enterprise Linux for ibm z systems=9.2
redhat enterprise Linux for ibm z systems eus=8.8
redhat enterprise Linux for power little endian eus=8.8
redhat enterprise Linux for power little endian eus=9.2
redhat enterprise Linux server aus=8.6
redhat enterprise Linux server aus=9.2
redhat enterprise Linux server for power little endian update services for sap solutions=8.6
redhat enterprise Linux server for power little endian update services for sap solutions=8.8
redhat enterprise Linux server for power little endian update services for sap solutions=9.2
redhat enterprise Linux server tus=8.6
redhat enterprise Linux server tus=8.8
Red Hat Enterprise Linux for SAP Solutions=8.6
Red Hat Enterprise Linux for SAP Solutions=8.8

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-1062?

    CVE-2024-1062 is classified as a high severity vulnerability due to its potential to cause a denial of service.

  • How do I fix CVE-2024-1062?

    To fix CVE-2024-1062, update the affected version of 389-ds-base to at least version 2.2.0 or later.

  • What systems are affected by CVE-2024-1062?

    CVE-2024-1062 affects versions of 389-ds-base up to 2.2.0 and several versions of Red Hat Directory Server.

  • What type of vulnerability is CVE-2024-1062?

    CVE-2024-1062 is a heap overflow vulnerability that occurs when writing values larger than 256 characters in log_entry_attr.

  • What are the potential impacts of CVE-2024-1062?

    The potential impacts of CVE-2024-1062 include service disruption and denial of service due to the heap overflow.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203