First published: Wed Jun 16 2010(Updated: )
A vulnerability in Red Hat Directory Server and the 389 Directory Server was discovered. The code that parses the GER request (_ger_parse_control()) can dereference a NULL pointer. An unauthenticated user able to communicate with the Directory Server could use a crafted search query that would cause the Directory Server to crash. This issue has been assigned the name <a href="https://access.redhat.com/security/cve/CVE-2010-2222">CVE-2010-2222</a>.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Directory Server | ||
389 Directory Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-604783 is considered critical due to the potential for unauthenticated remote code execution.
To fix REDHAT-BUG-604783, it is recommended to apply the latest patches provided by Red Hat for the Directory Server or 389 Directory Server.
The potential impacts of REDHAT-BUG-604783 include denial of service and unauthorized access to sensitive directory information.
REDHAT-BUG-604783 affects users running vulnerable versions of the Red Hat Directory Server and the 389 Directory Server.
Yes, REDHAT-BUG-604783 is exploitable by an unauthenticated user who can send a crafted search query to the Directory Server.