Vulnerability identifier: #VU15529
Vulnerability risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
389-ds-base
Server applications /
Directory software, identity management
Vendor: 389 Directory Server Project
Description
The vulnerability allows a remote authenticated attacker to cause DoS condition on the target system.
The vulnerability exists due to improper processing of Lightweight Directory Access Protocol (LDAP) queries. A remote attacker can send execute the ldapsearch command with server-side sorting controls and cause the LDAP server to crash, resulting in a DoS condition.
Mitigation
The vulnerability has been addressed in the versions 1.3.8.7 and 1.4.0.14.
Vulnerable software versions
389-ds-base: 1.1.0 - 1.1.46, 1.2.0, 1.2.9.0 - 1.2.9.9, 1.2.10.a8 - 1.2.10.24, 1.2.11.1 - 1.2.11.23, 1.3.0 - 1.3.0.8, 1.3.1.0 - 1.3.1.19, 1.3.3.1, 1.3.4, 1.3.5.1 - 1.3.5.19, 1.3.6 - 1.3.6.15, 1.3.7 - 1.3.7.10, 1.3.8 - 1.3.8.3, 1.4.0 - 1.4.0.10
External links
https://pagure.io/389-ds-base/issue/49890
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.