First published: Wed Aug 13 2008(Updated: )
Richard Megginson identified multiple memory leaks affecting Red Hat Directory Server and Fedora Directory Server. These issues may possibly be triggered by unauthenticated remote attackers with access to LDAP port. An attacker can cause Directory Server to use excessive amount of memory, and possibly crash or terminate unexpectedly when running out of available memory. Memory leaks that can be triggered by an anonymous user occur during authentication / bind phase, or in (anonymous) LDAP search requests. Affected version: Red Hat Directory Server 7.1, 8.0 Fedora Directory Server 1.1.1 and earlier
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Directory Server | =7.1=8.0 | |
Red Hat 389 Directory Server | <1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-458977 is considered critical as it allows unauthenticated remote attackers to possibly exploit memory leaks.
Fixing REDHAT-BUG-458977 involves updating to the latest patched version of Red Hat Directory Server or Fedora Directory Server.
REDHAT-BUG-458977 affects Red Hat Directory Server version 7.1 and 8.0, as well as Fedora Directory Server up to version 1.1.1.
The vulnerability in REDHAT-BUG-458977 is caused by multiple memory leaks that can be triggered by unauthenticated remote access to the LDAP port.
The impact of REDHAT-BUG-458977 can lead to excessive memory usage on the Directory Server, potentially causing denial-of-service conditions.