Show filters
48 Total Results
Displaying 21-30 of 48
Sort by:
Attacker Value
Unknown

CVE-2018-1089

Disclosure Date: May 09, 2018 (last updated November 26, 2024)
389-ds-base before versions 1.4.0.9, 1.3.8.1, 1.3.6.15 did not properly handle long search filters with characters needing escapes, possibly leading to buffer overflows. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
0
Attacker Value
Unknown

CVE-2011-0704

Disclosure Date: May 04, 2018 (last updated November 26, 2024)
389 Directory Server 1.2.7.5, when built with mozldap, allows remote attackers to cause a denial of service (replica crash) by sending an empty modify request.
0
Attacker Value
Unknown

CVE-2017-2591

Disclosure Date: April 30, 2018 (last updated November 08, 2023)
389-ds-base before version 1.3.6 is vulnerable to an improperly NULL terminated array in the uniqueness_entry_to_config() function in the "attribute uniqueness" plugin of 389 Directory Server. An authenticated, or possibly unauthenticated, attacker could use this flaw to force an out-of-bound heap memory read, possibly triggering a crash of the LDAP service.
0
Attacker Value
Unknown

CVE-2018-1054

Disclosure Date: March 07, 2018 (last updated November 26, 2024)
An out-of-bounds memory read flaw was found in the way 389-ds-base handled certain LDAP search filters, affecting all versions including 1.4.x. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
0
Attacker Value
Unknown

CVE-2017-15134

Disclosure Date: March 01, 2018 (last updated November 26, 2024)
A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5 handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
0
Attacker Value
Unknown

CVE-2017-15135

Disclosure Date: January 24, 2018 (last updated November 26, 2024)
It was found that 389-ds-base since 1.3.6.1 up to and including 1.4.0.3 did not always handle internal hash comparison operations correctly during the authentication process. A remote, unauthenticated attacker could potentially use this flaw to bypass the authentication process under very rare and specific circumstances.
0
Attacker Value
Unknown

CVE-2015-1854

Disclosure Date: September 19, 2017 (last updated November 26, 2024)
389 Directory Server before 1.3.3.10 allows attackers to bypass intended access restrictions and modify directory entries via a crafted ldapmodrdn call.
0
Attacker Value
Unknown

CVE-2017-7551

Disclosure Date: August 16, 2017 (last updated November 26, 2024)
389-ds-base version before 1.3.5.19 and 1.3.6.7 are vulnerable to password brute-force attacks during account lockout due to different return codes returned on password attempts.
0
Attacker Value
Unknown

CVE-2016-0741

Disclosure Date: April 19, 2016 (last updated November 25, 2024)
slapd/connection.c in 389 Directory Server (formerly Fedora Directory Server) 1.3.4.x before 1.3.4.7 allows remote attackers to cause a denial of service (infinite loop and connection blocking) by leveraging an abnormally closed connection.
0
Attacker Value
Unknown

CVE-2015-3230

Disclosure Date: October 29, 2015 (last updated October 05, 2023)
389 Directory Server (formerly Fedora Directory Server) before 1.3.3.12 does not enforce the nsSSL3Ciphers preference when creating an sslSocket, which allows remote attackers to have unspecified impact by requesting to use a disabled cipher.
0