Fedoraproject

389 Directory Server

39 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.38%
  • Published 01.10.2012 03:26:16
  • Last modified 11.04.2025 00:51:21

389 Directory Server 1.2.10 does not properly update the ACL when a DN entry is moved by a modrdn operation, which allows remote authenticated users with certain permissions to bypass ACL restrictions and access the DN entry.

  • EPSS 0.51%
  • Published 03.07.2012 16:40:34
  • Last modified 11.04.2025 00:51:21

389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), when the password of a LDAP user has been changed and audit logging is enabled, saves the new password to the log in plain text, which allows remote authenticated us...

  • EPSS 0.24%
  • Published 03.07.2012 16:40:33
  • Last modified 11.04.2025 00:51:21

389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), after the password for a LDAP user has been changed and before the server has been reset, allows remote attackers to read the plaintext password via the unhashed#use...

Exploit
  • EPSS 0.24%
  • Published 03.07.2012 16:40:31
  • Last modified 11.04.2025 00:51:21

The acllas__handle_group_entry function in servers/plugins/acl/acllas.c in 389 Directory Server before 1.2.10 does not properly handled access control instructions (ACIs) that use certificate groups, which allows remote authenticated LDAP users with ...

  • EPSS 0.6%
  • Published 23.02.2011 19:00:02
  • Last modified 11.04.2025 00:51:21

slapd (aka ns-slapd) in 389 Directory Server before 1.2.8.a2 does not properly manage the c_timelimit field of the connection table element, which allows remote attackers to cause a denial of service (daemon outage) via Simple Paged Results connectio...

  • EPSS 0.47%
  • Published 23.02.2011 19:00:01
  • Last modified 11.04.2025 00:51:21

Multiple memory leaks in the normalization functionality in 389 Directory Server before 1.2.7.5 allow remote attackers to cause a denial of service (memory consumption) via "badly behaved applications," related to (1) Slapi_Attr mishandling in the DN...

  • EPSS 0.05%
  • Published 23.02.2011 19:00:01
  • Last modified 11.04.2025 00:51:21

The (1) backup and restore scripts, (2) main initialization script, and (3) ldap-agent script in 389 Directory Server 1.2.x (aka Red Hat Directory Server 8.2.x) place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to ga...

  • EPSS 0.04%
  • Published 23.02.2011 19:00:01
  • Last modified 11.04.2025 00:51:21

The setup scripts in 389 Directory Server 1.2.x (aka Red Hat Directory Server 8.2.x), when multiple unprivileged instances are configured, use 0777 permissions for the /var/run/dirsrv directory, which allows local users to cause a denial of service (...

  • EPSS 0.73%
  • Published 23.02.2011 19:00:01
  • Last modified 11.04.2025 00:51:21

slapd (aka ns-slapd) in 389 Directory Server 1.2.7.5 (aka Red Hat Directory Server 8.2.x or dirsrv) does not properly handle simple paged result searches, which allows remote attackers to cause a denial of service (daemon crash) or possibly have unsp...