296,746
Total vulnerabilities in the database
389-ds-base before versions 1.4.0.9, 1.3.8.1, 1.3.6.15 did not properly handle long search filters with characters needing escapes, possibly leading to buffer overflows. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
| Software | From | Fixed in |
|---|---|---|
| fedoraproject / 389_directory_server | 1.3.8.1 | 1.3.8.1.x |
| fedoraproject / 389_directory_server | 1.4.0.0 | 1.4.0.9 |
| fedoraproject / 389_directory_server | 1.3.6.0 | 1.3.6.15 |
| fedoraproject / 389_directory_server | 1.3.8.2 | 1.3.8.2.x |
| redhat / enterprise_linux_desktop | 7.0 | 7.0.x |
| redhat / enterprise_linux_workstation | 7.0 | 7.0.x |
| redhat / enterprise_linux_server | 7.0 | 7.0.x |
| redhat / enterprise_linux_desktop | 6.0 | 6.0.x |
| redhat / enterprise_linux_server | 6.0 | 6.0.x |
| redhat / enterprise_linux_workstation | 6.0 | 6.0.x |
| debian / debian_linux | 8.0 | 8.0.x |