Show filters
49 Total Results
Displaying 11-20 of 49
Sort by:
Attacker Value
Unknown
CVE-2022-0996
Disclosure Date: March 23, 2022 (last updated February 23, 2025)
A vulnerability was found in the 389 Directory Server that allows expired passwords to access the database to cause improper authentication.
0
Attacker Value
Unknown
CVE-2020-35518
Disclosure Date: March 26, 2021 (last updated February 22, 2025)
When binding against a DN during authentication, the reply from 389-ds-base will be different whether the DN exists or not. This can be used by an unauthenticated attacker to check the existence of an entry in the LDAP database.
0
Attacker Value
Unknown
CVE-2010-3282
Disclosure Date: January 09, 2020 (last updated February 21, 2025)
389 Directory Server before 1.2.7.1 (aka Red Hat Directory Server 8.2) and HP-UX Directory Server before B.08.10.03, when audit logging is enabled, logs the Directory Manager password (nsslapd-rootpw) in cleartext when changing cn=config:nsslapd-rootpw, which might allow local users to obtain sensitive information by reading the log.
0
Attacker Value
Unknown
CVE-2019-14907
Disclosure Date: December 10, 2019 (last updated February 21, 2025)
All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).
0
Attacker Value
Unknown
CVE-2019-14824
Disclosure Date: November 08, 2019 (last updated November 27, 2024)
A flaw was found in the 'deref' plugin of 389-ds-base where it could use the 'search' permission to display attribute values. In some configurations, this could allow an authenticated attacker to view private attributes, such as password hashes.
0
Attacker Value
Unknown
CVE-2010-2222
Disclosure Date: November 05, 2019 (last updated November 27, 2024)
The _ger_parse_control function in Red Hat Directory Server 8 and the 389 Directory Server allows attackers to cause a denial of service (NULL pointer dereference) via a crafted search query.
0
Attacker Value
Unknown
CVE-2019-0227
Disclosure Date: May 01, 2019 (last updated November 08, 2023)
A Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis 1.4 distribution that was last released in 2006. Security and bug commits commits continue in the projects Axis 1.x Subversion repository, legacy users are encouraged to build from source. The successor to Axis 1.x is Axis2, the latest version is 1.7.9 and is not vulnerable to this issue.
0
Attacker Value
Unknown
CVE-2019-3883
Disclosure Date: April 17, 2019 (last updated November 27, 2024)
In 389-ds-base up to version 1.4.1.2, requests are handled by workers threads. Each sockets will be waited by the worker for at most 'ioblocktimeout' seconds. However this timeout applies only for un-encrypted requests. Connections using SSL/TLS are not taking this timeout into account during reads, and may hang longer.An unauthenticated attacker could repeatedly create hanging LDAP requests to hang all the workers, resulting in a Denial of Service.
0
Attacker Value
Unknown
CVE-2018-14648
Disclosure Date: September 28, 2018 (last updated November 27, 2024)
A flaw was found in 389 Directory Server. A specially crafted search query could lead to excessive CPU consumption in the do_search() function. An unauthenticated attacker could use this flaw to provoke a denial of service.
0
Attacker Value
Unknown
CVE-2018-14624
Disclosure Date: September 06, 2018 (last updated November 27, 2024)
A vulnerability was discovered in 389-ds-base through versions 1.3.7.10, 1.3.8.8 and 1.4.0.16. The lock controlling the error log was not correctly used when re-opening the log file in log__error_emergency(). An attacker could send a flood of modifications to a very large DN, which would cause slapd to crash.
0