First published: Thu Jun 13 2024(Updated: )
A denial of service vulnerability was found in 389-ds-base ldap server. This issue may allow an authenticated user to cause a server crash or hang while authenticating with an user having a malformed userPassword. By default only the administrator may directly add hashed password that can trigger the issue. But if nsslapd-allow-hashed-passwords config parameter is turned on, any user can trigger the issue. The problem is triggered by adding a password to an user using the hashed format (with a hash value too long for the specified hash scheme) Then later on when trying to authenticate on that user its triggers the buffer overflow By default, only administrators are allowed to add hashed passwords but there is a configuration parameter (nsslapd-allow-hashed-passwords) allowing any users to add hashed passwords and potentially trigger the DoS. This vulnerability affects versions: >= 1.3.7.2
Affected Software | Affected Version | How to fix |
---|---|---|
389 Directory Server | >=1.3.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2292104 is classified as a denial of service vulnerability.
To fix REDHAT-BUG-2292104, update to the latest version of 389-ds-base that addresses this vulnerability.
Versions of 389-ds-base from 1.3.7.2 onwards are affected by REDHAT-BUG-2292104.
Yes, authenticated users can exploit REDHAT-BUG-2292104 to cause a server crash or hang.
The vulnerable component in REDHAT-BUG-2292104 is the 389-ds-base LDAP server.