Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-0918

Опубликовано: 16 мар. 2022
Источник: redhat
CVSS3: 7.5

Описание

A vulnerability was discovered in the 389 Directory Server that allows an unauthenticated attacker with network access to the LDAP port to cause a denial of service. The denial of service is triggered by a single message sent over a TCP connection, no bind or other authentication is required. The message triggers a segmentation fault that results in slapd crashing.

A vulnerability was found in the 389 Directory Server that allows an unauthenticated attacker with network access to the LDAP port to cause a denial of service. The denial of service is triggered by a single message sent over a TCP connection. No bind or other authentication is required. This message triggers a segmentation fault that results in slapd crashing.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Directory Server 12redhat-ds:12/389-ds-baseAffected
Red Hat Enterprise Linux 6389-ds-baseOut of support scope
Red Hat Directory Server 11.5 for RHEL 8redhat-dsFixedRHSA-2022:221011.05.2022
Red Hat Enterprise Linux 7389-ds-baseFixedRHSA-2022:523928.06.2022
Red Hat Enterprise Linux 8389-dsFixedRHSA-2022:582302.08.2022
Red Hat Enterprise Linux 8.4 Extended Update Support389-dsFixedRHSA-2022:562019.07.2022
Red Hat Enterprise Linux 9389-ds-baseFixedRHSA-2022:816215.11.2022
Red Hat Enterprise Linux 9.0 Extended Update Support389-ds-baseFixedRHSA-2022:897613.12.2022

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-400->CWE-770
https://bugzilla.redhat.com/show_bug.cgi?id=2055815389-ds-base: sending crafted message could result in DoS

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 3 лет назад

A vulnerability was discovered in the 389 Directory Server that allows an unauthenticated attacker with network access to the LDAP port to cause a denial of service. The denial of service is triggered by a single message sent over a TCP connection, no bind or other authentication is required. The message triggers a segmentation fault that results in slapd crashing.

CVSS3: 7.5
nvd
больше 3 лет назад

A vulnerability was discovered in the 389 Directory Server that allows an unauthenticated attacker with network access to the LDAP port to cause a denial of service. The denial of service is triggered by a single message sent over a TCP connection, no bind or other authentication is required. The message triggers a segmentation fault that results in slapd crashing.

CVSS3: 7.5
debian
больше 3 лет назад

A vulnerability was discovered in the 389 Directory Server that allows ...

CVSS3: 7.5
github
больше 3 лет назад

A vulnerability was discovered in the 389 Directory Server that allows an unauthenticated attacker with network access to the LDAP port to cause a denial of service. The denial of service is triggered by a single message sent over a TCP connection, no bind or other authentication is required. The message triggers a segmentation fault that results in slapd crashing.

CVSS3: 7.5
fstec
больше 3 лет назад

Уязвимость сервера службы каталогов 389 Directory Server, связанная с ошибками при освобождении ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

7.5 High

CVSS3