First published: Thu Feb 17 2022(Updated: )
A vulnerability was discovered in the 389 Directory Server that allows an unauthenticated attacker with network access to the LDAP port to cause a denial of service. The denial of service is triggered by a single message sent over a TCP connection, no bind or other authentication is required. The message triggers a segmentation fault that results in slapd crashing.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Directory Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2055815 is classified as a denial of service vulnerability.
To fix REDHAT-BUG-2055815, update your Red Hat 389 Directory Server to the latest patched version.
Any user running the Red Hat 389 Directory Server is affected by REDHAT-BUG-2055815.
No, REDHAT-BUG-2055815 can be triggered by unauthenticated users with network access.
REDHAT-BUG-2055815 facilitates a denial of service attack by sending a single message over a TCP connection.