2.3

CVE-2012-0833

Exploit

The acllas__handle_group_entry function in servers/plugins/acl/acllas.c in 389 Directory Server before 1.2.10 does not properly handled access control instructions (ACIs) that use certificate groups, which allows remote authenticated LDAP users with a certificate group to cause a denial of service (infinite loop and CPU consumption) by binding to the server.

Data is provided by the National Vulnerability Database (NVD)
Fedoraproject389 Directory Server Updaterc1 Version <= 1.2.10
Fedoraproject389 Directory Server Version1.2.5 Updaterc1
Fedoraproject389 Directory Server Version1.2.5 Updaterc2
Fedoraproject389 Directory Server Version1.2.5 Updaterc3
Fedoraproject389 Directory Server Version1.2.5 Updaterc4
Fedoraproject389 Directory Server Version1.2.6 Updatea2
Fedoraproject389 Directory Server Version1.2.6 Updatea3
Fedoraproject389 Directory Server Version1.2.6 Updatea4
Fedoraproject389 Directory Server Version1.2.6 Updaterc1
Fedoraproject389 Directory Server Version1.2.6 Updaterc2
Fedoraproject389 Directory Server Version1.2.6 Updaterc3
Fedoraproject389 Directory Server Version1.2.6 Updaterc6
Fedoraproject389 Directory Server Version1.2.6 Updaterc7
Fedoraproject389 Directory Server Version1.2.6.1
Fedoraproject389 Directory Server Version1.2.7 Updatealpha3
Fedoraproject389 Directory Server Version1.2.7.5
Fedoraproject389 Directory Server Version1.2.8 Updatealpha1
Fedoraproject389 Directory Server Version1.2.8 Updatealpha2
Fedoraproject389 Directory Server Version1.2.8 Updatealpha3
Fedoraproject389 Directory Server Version1.2.8 Updaterc1
Fedoraproject389 Directory Server Version1.2.8 Updaterc2
Fedoraproject389 Directory Server Version1.2.8.1
Fedoraproject389 Directory Server Version1.2.8.2
Fedoraproject389 Directory Server Version1.2.8.3
Fedoraproject389 Directory Server Version1.2.9.9
Fedoraproject389 Directory Server Version1.2.10 Updatealpha8
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.24% 0.476
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 2.3 4.4 2.9
AV:A/AC:M/Au:S/C:N/I:N/A:P