First published: Fri Jun 21 2024(Updated: )
Summary: An unauthenticated user can cause a systematic server crash while sending a specific extended search request. Description: 389-ds-base in RHEL 9.4 - RHDS 12.4, supports a new matching rule (inchain or 1.2.840.113556.1.4.1941). This matching rule requires that the matching attribute has a DN syntax. If the attribute in the ldap client request is not DN syntax, the server logs a message. The format of the message requires an attribute but as the attribute is missing, it triggers a SEGV. Steps to reproduce: See below
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Directory Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2293579 is critical as it allows unauthenticated users to crash the server.
To fix REDHAT-BUG-2293579, upgrade to the latest version of the Red Hat 389 Directory Server.
The potential impacts of REDHAT-BUG-2293579 include service disruption and system downtime due to server crashes.
Users of Red Hat 389 Directory Server version 12.4 in RHEL 9.4 are affected by REDHAT-BUG-2293579.
Yes, REDHAT-BUG-2293579 has a low barrier to exploit as it can be triggered by unauthenticated users.