Unrated severityNVD Advisory· Published May 9, 2018· Updated Aug 5, 2024
CVE-2018-1089
CVE-2018-1089
Description
389-ds-base before versions 1.4.0.9, 1.3.8.1, 1.3.6.15 did not properly handle long search filters with characters needing escapes, possibly leading to buffer overflows. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
Affected products
4- osv-coords3 versionspkg:rpm/opensuse/389-ds&distro=openSUSE%20Tumbleweedpkg:rpm/suse/389-ds&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015pkg:rpm/suse/389-ds&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP1
< 2.0.10~git0.21dd2802c-1.1+ 2 more
- (no CPE)range: < 2.0.10~git0.21dd2802c-1.1
- (no CPE)range: < 1.4.0.26~git0.8a2d3de6f-4.14.1
- (no CPE)range: < 1.4.0.26~git0.8a2d3de6f-4.14.1
- unspecified/389-ds-basev5Range: 389-ds-base 1.4.0.9
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- access.redhat.com/errata/RHSA-2018:1364mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:1380mitrevendor-advisoryx_refsource_REDHAT
- www.securityfocus.com/bid/104137mitrevdb-entryx_refsource_BID
- bugzilla.redhat.com/show_bug.cgimitrex_refsource_CONFIRM
- lists.debian.org/debian-lts-announce/2018/07/msg00018.htmlmitremailing-listx_refsource_MLIST
News mentions
0No linked articles in our index yet.