Show filters
48 Total Results
Displaying 1-10 of 48
Sort by:
Attacker Value
Unknown
CVE-2024-6237
Disclosure Date: July 09, 2024 (last updated August 12, 2024)
A flaw was found in the 389 Directory Server. This flaw allows an unauthenticated user to cause a systematic server crash while sending a specific extended search request, leading to a denial of service.
0
Attacker Value
Unknown
CVE-2024-1062
Disclosure Date: February 12, 2024 (last updated February 18, 2025)
A heap overflow flaw was found in 389-ds-base. This issue leads to a denial of service when writing a value larger than 256 chars in log_entry_attr.
0
Attacker Value
Unknown
CVE-2022-2850
Disclosure Date: October 14, 2022 (last updated October 08, 2023)
A flaw was found In 389-ds-base. When the Content Synchronization plugin is enabled, an authenticated user can reach a NULL pointer dereference using a specially crafted query. This flaw allows an authenticated attacker to cause a denial of service. This CVE is assigned against an incomplete fix of CVE-2021-3514.
0
Attacker Value
Unknown
CVE-2022-1949
Disclosure Date: June 02, 2022 (last updated December 18, 2024)
An access control bypass vulnerability found in 389-ds-base. That mishandling of the filter that would yield incorrect results, but as that has progressed, can be determined that it actually is an access control bypass. This may allow any remote unauthenticated user to issue a filter that allows searching for database items they do not have access to, including but not limited to potentially userPassword hashes and other sensitive data.
0
Attacker Value
Unknown
CVE-2022-0996
Disclosure Date: March 23, 2022 (last updated October 07, 2023)
A vulnerability was found in the 389 Directory Server that allows expired passwords to access the database to cause improper authentication.
0
Attacker Value
Unknown
CVE-2021-3514
Disclosure Date: May 28, 2021 (last updated November 28, 2024)
When using a sync_repl client in 389-ds-base, an authenticated attacker can cause a NULL pointer dereference using a specially crafted query, causing a crash.
0
Attacker Value
Unknown
CVE-2020-35518
Disclosure Date: March 26, 2021 (last updated February 22, 2025)
When binding against a DN during authentication, the reply from 389-ds-base will be different whether the DN exists or not. This can be used by an unauthenticated attacker to check the existence of an entry in the LDAP database.
0
Attacker Value
Unknown
CVE-2010-3282
Disclosure Date: January 09, 2020 (last updated February 21, 2025)
389 Directory Server before 1.2.7.1 (aka Red Hat Directory Server 8.2) and HP-UX Directory Server before B.08.10.03, when audit logging is enabled, logs the Directory Manager password (nsslapd-rootpw) in cleartext when changing cn=config:nsslapd-rootpw, which might allow local users to obtain sensitive information by reading the log.
0
Attacker Value
Unknown
CVE-2019-10224
Disclosure Date: November 25, 2019 (last updated November 27, 2024)
A flaw has been found in 389-ds-base versions 1.4.x.x before 1.4.1.3. When executed in verbose mode, the dscreate and dsconf commands may display sensitive information, such as the Directory Manager password. An attacker, able to see the screen or record the terminal standard error output, could use this flaw to gain sensitive information.
0
Attacker Value
Unknown
CVE-2019-14824
Disclosure Date: November 08, 2019 (last updated November 27, 2024)
A flaw was found in the 'deref' plugin of 389-ds-base where it could use the 'search' permission to display attribute values. In some configurations, this could allow an authenticated attacker to view private attributes, such as password hashes.
0