Show filters
48 Total Results
Displaying 1-10 of 48
Sort by:
Attacker Value
Unknown

CVE-2024-6237

Disclosure Date: July 09, 2024 (last updated August 12, 2024)
A flaw was found in the 389 Directory Server. This flaw allows an unauthenticated user to cause a systematic server crash while sending a specific extended search request, leading to a denial of service.
Attacker Value
Unknown

CVE-2024-1062

Disclosure Date: February 12, 2024 (last updated February 18, 2025)
A heap overflow flaw was found in 389-ds-base. This issue leads to a denial of service when writing a value larger than 256 chars in log_entry_attr.
0
Attacker Value
Unknown

CVE-2022-2850

Disclosure Date: October 14, 2022 (last updated October 08, 2023)
A flaw was found In 389-ds-base. When the Content Synchronization plugin is enabled, an authenticated user can reach a NULL pointer dereference using a specially crafted query. This flaw allows an authenticated attacker to cause a denial of service. This CVE is assigned against an incomplete fix of CVE-2021-3514.
Attacker Value
Unknown

CVE-2022-1949

Disclosure Date: June 02, 2022 (last updated December 18, 2024)
An access control bypass vulnerability found in 389-ds-base. That mishandling of the filter that would yield incorrect results, but as that has progressed, can be determined that it actually is an access control bypass. This may allow any remote unauthenticated user to issue a filter that allows searching for database items they do not have access to, including but not limited to potentially userPassword hashes and other sensitive data.
Attacker Value
Unknown

CVE-2022-0996

Disclosure Date: March 23, 2022 (last updated October 07, 2023)
A vulnerability was found in the 389 Directory Server that allows expired passwords to access the database to cause improper authentication.
Attacker Value
Unknown

CVE-2021-3514

Disclosure Date: May 28, 2021 (last updated November 28, 2024)
When using a sync_repl client in 389-ds-base, an authenticated attacker can cause a NULL pointer dereference using a specially crafted query, causing a crash.
Attacker Value
Unknown

CVE-2020-35518

Disclosure Date: March 26, 2021 (last updated February 22, 2025)
When binding against a DN during authentication, the reply from 389-ds-base will be different whether the DN exists or not. This can be used by an unauthenticated attacker to check the existence of an entry in the LDAP database.
Attacker Value
Unknown

CVE-2010-3282

Disclosure Date: January 09, 2020 (last updated February 21, 2025)
389 Directory Server before 1.2.7.1 (aka Red Hat Directory Server 8.2) and HP-UX Directory Server before B.08.10.03, when audit logging is enabled, logs the Directory Manager password (nsslapd-rootpw) in cleartext when changing cn=config:nsslapd-rootpw, which might allow local users to obtain sensitive information by reading the log.
Attacker Value
Unknown

CVE-2019-10224

Disclosure Date: November 25, 2019 (last updated November 27, 2024)
A flaw has been found in 389-ds-base versions 1.4.x.x before 1.4.1.3. When executed in verbose mode, the dscreate and dsconf commands may display sensitive information, such as the Directory Manager password. An attacker, able to see the screen or record the terminal standard error output, could use this flaw to gain sensitive information.
Attacker Value
Unknown

CVE-2019-14824

Disclosure Date: November 08, 2019 (last updated November 27, 2024)
A flaw was found in the 'deref' plugin of 389-ds-base where it could use the 'search' permission to display attribute values. In some configurations, this could allow an authenticated attacker to view private attributes, such as password hashes.