Unknown
CVE-2010-4217
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Use-after-free vulnerability in the proxy server in IBM Tivoli Directory Server (TDS) 6.0.0.x before 6.0.0.8-TIV-ITDS-IF0007 and 6.1.x before 6.1.0-TIV-ITDS-FP0005 allows remote attackers to cause a denial of service (daemon crash) via an unbind request that occurs during a certain search operation.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- tivoli directory server 6.0.0.0,
- tivoli directory server 6.0.0.1,
- tivoli directory server 6.0.0.14,
- tivoli directory server 6.0.0.19,
- tivoli directory server 6.0.0.33,
- tivoli directory server 6.0.0.41,
- tivoli directory server 6.0.0.45,
- tivoli directory server 6.0.0.52,
- tivoli directory server 6.0.0.53,
- tivoli directory server 6.0.0.54,
- tivoli directory server 6.0.0.55,
- tivoli directory server 6.0.0.56,
- tivoli directory server 6.0.0.57,
- tivoli directory server 6.0.0.58,
- tivoli directory server 6.0.0.59,
- tivoli directory server 6.0.0.60,
- tivoli directory server 6.0.0.61,
- tivoli directory server 6.0.0.62,
- tivoli directory server 6.0.0.63,
- tivoli directory server 6.0.0.64,
- tivoli directory server 6.0.0.7,
- tivoli directory server 6.0.0.8,
- tivoli directory server 6.1.0.0,
- tivoli directory server 6.1.0.5
References
Advisory
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: