Fedoraproject

389 Directory Server

39 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.05%
  • Published 13.06.2018 20:29:00
  • Last modified 21.11.2024 03:42:08

389-ds-base before versions 1.4.0.10, 1.3.8.3 is vulnerable to a race condition in the way 389-ds-base handles persistent search, resulting in a crash if the server is under load. An anonymous attacker could use this flaw to trigger a denial of servi...

  • EPSS 14.57%
  • Published 09.05.2018 15:29:00
  • Last modified 21.11.2024 03:59:09

389-ds-base before versions 1.4.0.9, 1.3.8.1, 1.3.6.15 did not properly handle long search filters with characters needing escapes, possibly leading to buffer overflows. A remote, unauthenticated attacker could potentially use this flaw to make ns-sl...

  • EPSS 0.45%
  • Published 04.05.2018 20:29:00
  • Last modified 21.11.2024 01:24:39

389 Directory Server 1.2.7.5, when built with mozldap, allows remote attackers to cause a denial of service (replica crash) by sending an empty modify request.

  • EPSS 6.83%
  • Published 30.04.2018 12:29:00
  • Last modified 21.11.2024 03:23:47

389-ds-base before version 1.3.6 is vulnerable to an improperly NULL terminated array in the uniqueness_entry_to_config() function in the "attribute uniqueness" plugin of 389 Directory Server. An authenticated, or possibly unauthenticated, attacker c...

  • EPSS 6.85%
  • Published 07.03.2018 13:29:00
  • Last modified 21.11.2024 03:59:04

An out-of-bounds memory read flaw was found in the way 389-ds-base handled certain LDAP search filters, affecting all versions including 1.4.x. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially ...

  • EPSS 1.7%
  • Published 01.03.2018 22:29:00
  • Last modified 21.11.2024 03:14:08

A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5 handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-sla...

  • EPSS 2.07%
  • Published 24.01.2018 15:29:01
  • Last modified 21.11.2024 03:14:08

It was found that 389-ds-base since 1.3.6.1 up to and including 1.4.0.3 did not always handle internal hash comparison operations correctly during the authentication process. A remote, unauthenticated attacker could potentially use this flaw to bypas...

  • EPSS 0.43%
  • Published 19.09.2017 15:29:00
  • Last modified 20.04.2025 01:37:25

389 Directory Server before 1.3.3.10 allows attackers to bypass intended access restrictions and modify directory entries via a crafted ldapmodrdn call.

Exploit
  • EPSS 0.39%
  • Published 16.08.2017 18:29:00
  • Last modified 20.04.2025 01:37:25

389-ds-base version before 1.3.5.19 and 1.3.6.7 are vulnerable to password brute-force attacks during account lockout due to different return codes returned on password attempts.

  • EPSS 2.36%
  • Published 19.04.2016 21:59:06
  • Last modified 12.04.2025 10:46:40

slapd/connection.c in 389 Directory Server (formerly Fedora Directory Server) 1.3.4.x before 1.3.4.7 allows remote attackers to cause a denial of service (infinite loop and connection blocking) by leveraging an abnormally closed connection.