A vulnerability was discovered in the 389 Directory Server that allows an unauthenticated attacker with network access to the LDAP port to cause a denial of service. The denial of service is triggered by a single message sent over a TCP connection, no bind or other authentication is required. The message triggers a segmentation fault that results in slapd crashing.
Name | Vendor | Start Version | End Version |
---|---|---|---|
389-ds-base | Port389 | 1.4.0 (including) | 1.4.0 (including) |
389-ds-base | Ubuntu | bionic | * |
389-ds-base | Ubuntu | impish | * |
389-ds-base | Ubuntu | kinetic | * |
389-ds-base | Ubuntu | lunar | * |
389-ds-base | Ubuntu | mantic | * |
389-ds-base | Ubuntu | trusty | * |
389-ds-base | Ubuntu | xenial | * |
Red Hat Directory Server 11.5 for RHEL 8 | RedHat | redhat-ds:11-8060020220328133644.fd2afb17 | * |
Red Hat Enterprise Linux 7 | RedHat | 389-ds-base-0:1.3.10.2-16.el7_9 | * |
Red Hat Enterprise Linux 8 | RedHat | 389-ds:1.4-8060020220519123000.824efc52 | * |
Red Hat Enterprise Linux 8.4 Extended Update Support | RedHat | 389-ds:1.4-8040020220615161601.96015a92 | * |
Red Hat Enterprise Linux 9 | RedHat | 389-ds-base-0:2.1.3-4.el9_1 | * |
Red Hat Enterprise Linux 9.0 Extended Update Support | RedHat | 389-ds-base-0:2.0.14-3.el9_0 | * |