Total vulnerabilities in the database
389-ds-base before versions 1.4.0.9, 1.3.8.1, 1.3.6.15 did not properly handle long search filters with characters needing escapes, possibly leading to buffer overflows. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
Software | From | Fixed in |
---|---|---|
fedoraproject / 389_directory_server | 1.3.8.1 | 1.3.8.1.x |
fedoraproject / 389_directory_server | 1.4.0.0 | 1.4.0.9 |
fedoraproject / 389_directory_server | 1.3.6.0 | 1.3.6.15 |
fedoraproject / 389_directory_server | 1.3.8.2 | 1.3.8.2.x |
redhat / enterprise_linux_desktop | 7.0 | 7.0.x |
redhat / enterprise_linux_workstation | 7.0 | 7.0.x |
redhat / enterprise_linux_server | 7.0 | 7.0.x |
redhat / enterprise_linux_desktop | 6.0 | 6.0.x |
redhat / enterprise_linux_server | 6.0 | 6.0.x |
redhat / enterprise_linux_workstation | 6.0 | 6.0.x |
debian / debian_linux | 8.0 | 8.0.x |