CVE-2024-2199
Description
A denial of service vulnerability was found in 389-ds-base ldap server. This issue may allow an authenticated user to cause a server crash while modifying userPassword using malformed input.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An authenticated user can crash the 389-ds-base LDAP server by sending a malformed input during a userPassword modification, leading to a denial of service.
Vulnerability
Description
CVE-2024-2199 is a denial-of-service (DoS) vulnerability found in the 389 Directory Server (389-ds-base) LDAP server. The issue stems from improper handling of malformed input when an authenticated user modifies the userPassword attribute. Specifically, a crafted request can trigger a server crash, causing a denial of service condition for legitimate users [1].
Attack
Vector
An attacker must have valid authentication credentials to the LDAP server. No special privileges beyond regular user access are required. By sending a specially crafted LDAP modify request targeting the userPassword attribute, the attacker can cause the server process to terminate abruptly. The vulnerability is exploitable remotely over the network, as LDAP operations are typically transmitted over TCP/IP [2][3].
Impact
Successful exploitation results in a crash of the 389-ds-base server, leading to a temporary denial of service for all directory services provided by that instance. This can disrupt authentication, authorization, and other LDAP-dependent applications. The crash does not lead to data corruption or unauthorized access, but availability is compromised until the server is manually restarted [4].
Mitigation
Red Hat has released updated packages for 389-ds-base in multiple advisory streams (RHSA-2024:3837, RHSA-2024:4235, RHSA-2024:4633, RHSA-2024:5690) that fix this vulnerability. Users are advised to update the 389-ds-base package to the patched version (e.g., 2.4.5-8.el9_4 for RHEL 9). There is no known workaround; applying the update is the recommended remediation [1][4].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- access.redhat.com/errata/RHSA-2024:3591nvd
- access.redhat.com/errata/RHSA-2024:3837nvd
- access.redhat.com/errata/RHSA-2024:4092nvd
- access.redhat.com/errata/RHSA-2024:4209nvd
- access.redhat.com/errata/RHSA-2024:4210nvd
- access.redhat.com/errata/RHSA-2024:4235nvd
- access.redhat.com/errata/RHSA-2024:4633nvd
- access.redhat.com/errata/RHSA-2024:5690nvd
- access.redhat.com/errata/RHSA-2025:1632nvd
- access.redhat.com/security/cve/CVE-2024-2199nvd
- bugzilla.redhat.com/show_bug.cginvd
- lists.debian.org/debian-lts-announce/2025/01/msg00015.htmlnvd
News mentions
0No linked articles in our index yet.