Description
389-ds-base before versions 1.4.0.9, 1.3.8.1, 1.3.6.15 did not properly handle long search filters with characters needing escapes, possibly leading to buffer overflows. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1428-1 | 389-ds-base security update |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T03:51:48.500Z
Reserved: 2017-12-04T00:00:00.000Z
Link: CVE-2018-1089
No data.
Status : Modified
Published: 2018-05-09T15:29:00.207
Modified: 2024-11-21T03:59:09.490
Link: CVE-2018-1089
OpenCVE Enrichment
No data.
Debian DLA