Show filters
12 Total Results
Displaying 1-10 of 12
Sort by:
Attacker Value
Unknown

CVE-2014-3562

Disclosure Date: August 21, 2014 (last updated October 05, 2023)
Red Hat Directory Server 8 and 389 Directory Server, when debugging is enabled, allows remote attackers to obtain sensitive replicated metadata by searching the directory.
0
Attacker Value
Unknown

CVE-2014-0132

Disclosure Date: March 18, 2014 (last updated October 05, 2023)
The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.
0
Attacker Value
Unknown

CVE-2013-4485

Disclosure Date: November 23, 2013 (last updated October 05, 2023)
389 Directory Server 1.2.11.15 (aka Red Hat Directory Server before 8.2.11-14) allows remote authenticated users to cause a denial of service (crash) via multiple @ characters in a GER attribute list in a search request.
0
Attacker Value
Unknown

CVE-2013-1897

Disclosure Date: May 13, 2013 (last updated October 05, 2023)
The do_search function in ldap/servers/slapd/search.c in 389 Directory Server 1.2.x before 1.2.11.20 and 1.3.x before 1.3.0.5 does not properly restrict access to entries when the nsslapd-allow-anonymous-access configuration is set to rootdse and the BASE search scope is used, which allows remote attackers to obtain sensitive information outside of the rootDSE via a crafted LDAP search.
0
Attacker Value
Unknown

CVE-2012-4450

Disclosure Date: October 01, 2012 (last updated October 05, 2023)
389 Directory Server 1.2.10 does not properly update the ACL when a DN entry is moved by a modrdn operation, which allows remote authenticated users with certain permissions to bypass ACL restrictions and access the DN entry.
0
Attacker Value
Unknown

CVE-2012-2746

Disclosure Date: July 03, 2012 (last updated October 04, 2023)
389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), when the password of a LDAP user has been changed and audit logging is enabled, saves the new password to the log in plain text, which allows remote authenticated users to read the password.
0
Attacker Value
Unknown

CVE-2012-2678

Disclosure Date: July 03, 2012 (last updated October 04, 2023)
389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), after the password for a LDAP user has been changed and before the server has been reset, allows remote attackers to read the plaintext password via the unhashed#user#password attribute.
0
Attacker Value
Unknown

CVE-2012-0833

Disclosure Date: July 03, 2012 (last updated October 04, 2023)
The acllas__handle_group_entry function in servers/plugins/acl/acllas.c in 389 Directory Server before 1.2.10 does not properly handled access control instructions (ACIs) that use certificate groups, which allows remote authenticated LDAP users with a certificate group to cause a denial of service (infinite loop and CPU consumption) by binding to the server.
0
Attacker Value
Unknown

CVE-2010-4746

Disclosure Date: February 23, 2011 (last updated October 04, 2023)
Multiple memory leaks in the normalization functionality in 389 Directory Server before 1.2.7.5 allow remote attackers to cause a denial of service (memory consumption) via "badly behaved applications," related to (1) Slapi_Attr mishandling in the DN normalization code and (2) pointer mishandling in the syntax normalization code, a different issue than CVE-2011-0019.
0
Attacker Value
Unknown

CVE-2011-1067

Disclosure Date: February 23, 2011 (last updated October 04, 2023)
slapd (aka ns-slapd) in 389 Directory Server before 1.2.8.a2 does not properly manage the c_timelimit field of the connection table element, which allows remote attackers to cause a denial of service (daemon outage) via Simple Paged Results connections, as demonstrated by using multiple processes to replay TCP sessions, a different vulnerability than CVE-2011-0019.
0