Redhat

389 Directory Server

9 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.55%
  • Published 09.07.2024 17:15:48
  • Last modified 21.11.2024 09:49:15

A flaw was found in the 389 Directory Server. This flaw allows an unauthenticated user to cause a systematic server crash while sending a specific extended search request, leading to a denial of service.

  • EPSS 0.13%
  • Published 28.05.2024 12:15:08
  • Last modified 18.02.2025 11:15:12

A denial of service vulnerability was found in 389-ds-base ldap server. This issue may allow an authenticated user to cause a server crash while modifying `userPassword` using malformed input.

  • EPSS 0.02%
  • Published 12.02.2024 13:15:09
  • Last modified 18.02.2025 11:15:11

A heap overflow flaw was found in 389-ds-base. This issue leads to a denial of service when writing a value larger than 256 chars in log_entry_attr.

  • EPSS 0.51%
  • Published 02.06.2022 14:15:34
  • Last modified 13.12.2024 18:47:19

An access control bypass vulnerability found in 389-ds-base. That mishandling of the filter that would yield incorrect results, but as that has progressed, can be determined that it actually is an access control bypass. This may allow any remote unau...

Exploit
  • EPSS 0.09%
  • Published 23.03.2022 20:15:10
  • Last modified 21.11.2024 06:39:49

A vulnerability was found in the 389 Directory Server that allows expired passwords to access the database to cause improper authentication.

  • EPSS 0.1%
  • Published 28.05.2021 15:15:09
  • Last modified 21.11.2024 06:21:43

When using a sync_repl client in 389-ds-base, an authenticated attacker can cause a NULL pointer dereference using a specially crafted query, causing a crash.

  • EPSS 0.8%
  • Published 26.03.2021 17:15:12
  • Last modified 21.11.2024 05:27:28

When binding against a DN during authentication, the reply from 389-ds-base will be different whether the DN exists or not. This can be used by an unauthenticated attacker to check the existence of an entry in the LDAP database.

  • EPSS 0.44%
  • Published 05.11.2019 20:15:10
  • Last modified 21.11.2024 01:16:11

The _ger_parse_control function in Red Hat Directory Server 8 and the 389 Directory Server allows attackers to cause a denial of service (NULL pointer dereference) via a crafted search query.

  • EPSS 0.44%
  • Published 11.09.2018 15:29:00
  • Last modified 21.11.2024 03:42:20

A flaw was found in the 389 Directory Server that allows users to cause a crash in the LDAP server using ldapsearch with server side sort.