Unrated severityNVD Advisory· Published Mar 1, 2018· Updated Sep 16, 2024
CVE-2017-15134
CVE-2017-15134
Description
A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5 handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
Affected products
5- osv-coords4 versionspkg:rpm/opensuse/389-ds&distro=openSUSE%20Leap%2015.0pkg:rpm/opensuse/389-ds&distro=openSUSE%20Tumbleweedpkg:rpm/suse/389-ds&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015pkg:rpm/suse/389-ds&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP1
< 1.4.0.3-lp150.3.3.1+ 3 more
- (no CPE)range: < 1.4.0.3-lp150.3.3.1
- (no CPE)range: < 2.0.10~git0.21dd2802c-1.1
- (no CPE)range: < 1.4.0.3-4.7.52
- (no CPE)range: < 1.4.0.3-4.7.52
- Red Hat, Inc./389-ds-basev5Range: 1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- lists.opensuse.org/opensuse-security-announce/2019-05/msg00033.htmlmitrevendor-advisoryx_refsource_SUSE
- access.redhat.com/errata/RHSA-2018:0163mitrevendor-advisoryx_refsource_REDHAT
- www.securityfocus.com/bid/102790mitrevdb-entryx_refsource_BID
- bugzilla.redhat.com/show_bug.cgimitrex_refsource_CONFIRM
- lists.debian.org/debian-lts-announce/2018/07/msg00018.htmlmitremailing-listx_refsource_MLIST
- pagure.io/389-ds-base/c/6aa2acdc3cad9mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.