Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-14624

Опубликовано: 06 сент. 2018
Источник: debian
EPSS Низкий

Описание

A vulnerability was discovered in 389-ds-base through versions 1.3.7.10, 1.3.8.8 and 1.4.0.16. The lock controlling the error log was not correctly used when re-opening the log file in log__error_emergency(). An attacker could send a flood of modifications to a very large DN, which would cause slapd to crash.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
389-ds-basefixed1.4.0.18-1package
389-ds-baseno-dsastretchpackage

Примечания

  • https://pagure.io/389-ds-base/issue/49937

  • https://pagure.io/389-ds-base/c/8ff8cb850 (master)

  • https://pagure.io/389-ds-base/c/c5e78249d (389-ds-base-1.3.8)

  • https://pagure.io/389-ds-base/c/9f28620d2 (389-ds-base-1.3.7)

EPSS

Процентиль: 80%
0.01478
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 7 лет назад

A vulnerability was discovered in 389-ds-base through versions 1.3.7.10, 1.3.8.8 and 1.4.0.16. The lock controlling the error log was not correctly used when re-opening the log file in log__error_emergency(). An attacker could send a flood of modifications to a very large DN, which would cause slapd to crash.

CVSS3: 7.5
redhat
около 7 лет назад

A vulnerability was discovered in 389-ds-base through versions 1.3.7.10, 1.3.8.8 and 1.4.0.16. The lock controlling the error log was not correctly used when re-opening the log file in log__error_emergency(). An attacker could send a flood of modifications to a very large DN, which would cause slapd to crash.

CVSS3: 7.5
nvd
около 7 лет назад

A vulnerability was discovered in 389-ds-base through versions 1.3.7.10, 1.3.8.8 and 1.4.0.16. The lock controlling the error log was not correctly used when re-opening the log file in log__error_emergency(). An attacker could send a flood of modifications to a very large DN, which would cause slapd to crash.

CVSS3: 7.5
github
больше 3 лет назад

A vulnerability was discovered in 389-ds-base through versions 1.3.7.10, 1.3.8.8 and 1.4.0.16. The lock controlling the error log was not correctly used when re-opening the log file in log__error_emergency(). An attacker could send a flood of modifications to a very large DN, which would cause slapd to crash.

CVSS3: 7.5
fstec
около 7 лет назад

Уязвимость функции log__error_emergency() сервера службы каталогов 389 Directory Server, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 80%
0.01478
Низкий