CVE Vulnerabilities

CVE-2021-3514

NULL Pointer Dereference

Published: May 28, 2021 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
4 MEDIUM
AV:N/AC:L/Au:S/C:N/I:N/A:P
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

When using a sync_repl client in 389-ds-base, an authenticated attacker can cause a NULL pointer dereference using a specially crafted query, causing a crash.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
389_directory_serverRedhat- (including)- (including)
Red Hat Directory Server 11.3 for RHEL 8RedHatredhat-ds:11-8040020220114174559.d9abee45*
Red Hat Directory Server 11.4 for RHEL 8RedHatredhat-ds:11-8050020210920153716.d3df4063*
Red Hat Enterprise Linux 8RedHat389-ds:1.4-8040020210616143519.96015a92*
Red Hat Enterprise Linux 8.2 Extended Update SupportRedHat389-ds:1.4-8020020210515224321.dbc46ba7*
389-ds-baseUbuntubionic*
389-ds-baseUbuntuesm-apps/bionic*
389-ds-baseUbuntuesm-apps/focal*
389-ds-baseUbuntuesm-apps/xenial*
389-ds-baseUbuntufocal*
389-ds-baseUbuntugroovy*
389-ds-baseUbuntuhirsute*
389-ds-baseUbuntuimpish*
389-ds-baseUbuntutrusty*
389-ds-baseUbuntuupstream*
389-ds-baseUbuntuxenial*

Potential Mitigations

References