First published: Tue Mar 18 2025(Updated: )
A flaw was found in 389-ds-base. The problem occurs when issuing a Modify DN LDAP operation through the ldap protocol (using a TCP-IP or Unix socket as defined in the LDAP RFC <a href="https://datatracker.ietf.org/doc/html/rfc4511#section-4.9">https://datatracker.ietf.org/doc/html/rfc4511#section-4.9</a>) If it moves an ldap entry in the DIT at the same time that a failing operation impacts its parent entry.
Affected Software | Affected Version | How to fix |
---|---|---|
389 Directory Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2353071 is classified as high due to the potential for unauthorized modification of directory entries.
To fix REDHAT-BUG-2353071, you should update to the latest version of the 389-ds-base package that addresses this flaw.
REDHAT-BUG-2353071 affects systems running the 389 Directory Server software.
REDHAT-BUG-2353071 is an LDAP Modify DN operation vulnerability that can lead to unauthorized access.
You can verify if your system is vulnerable to REDHAT-BUG-2353071 by checking the version of the 389-ds-base package installed.