First published: Mon Aug 20 2018(Updated: )
A flaw was found in 389-ds-base. The server can be crashed by an anonymous client through a ldapmodify command with a large DN argument potentially causing denial of service. References: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - 389-ds-base: Crash in vslapd_log_emergency_error [rhel-7.6]" href="show_bug.cgi?id=1614820">https://bugzilla.redhat.com/show_bug.cgi?id=1614820</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Directory Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1619450 is classified as a denial of service vulnerability.
To fix REDHAT-BUG-1619450, update to the latest version of the Red Hat 389-ds-base that addresses this vulnerability.
REDHAT-BUG-1619450 is caused by the server being able to be crashed by an anonymous client through an ldapmodify command with a large DN argument.
Any installation of Red Hat 389-ds-base that allows anonymous connections is potentially affected by REDHAT-BUG-1619450.
Yes, an attacker can exploit REDHAT-BUG-1619450 remotely by sending a specially crafted ldapmodify command.