5

CVE-2011-1067

slapd (aka ns-slapd) in 389 Directory Server before 1.2.8.a2 does not properly manage the c_timelimit field of the connection table element, which allows remote attackers to cause a denial of service (daemon outage) via Simple Paged Results connections, as demonstrated by using multiple processes to replay TCP sessions, a different vulnerability than CVE-2011-0019.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Fedoraproject389 Directory Server Updatealpha1 Version <= 1.2.8
Fedoraproject389 Directory Server Version1.2.5 Updaterc1
Fedoraproject389 Directory Server Version1.2.5 Updaterc2
Fedoraproject389 Directory Server Version1.2.5 Updaterc3
Fedoraproject389 Directory Server Version1.2.5 Updaterc4
Fedoraproject389 Directory Server Version1.2.6 Updatea2
Fedoraproject389 Directory Server Version1.2.6 Updatea3
Fedoraproject389 Directory Server Version1.2.6 Updatea4
Fedoraproject389 Directory Server Version1.2.6 Updaterc1
Fedoraproject389 Directory Server Version1.2.6 Updaterc2
Fedoraproject389 Directory Server Version1.2.6 Updaterc3
Fedoraproject389 Directory Server Version1.2.6 Updaterc6
Fedoraproject389 Directory Server Version1.2.6 Updaterc7
Fedoraproject389 Directory Server Version1.2.6.1
Fedoraproject389 Directory Server Version1.2.7 Updatealpha3
Fedoraproject389 Directory Server Version1.2.7.5
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.6% 0.67
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.