MGASA-2016-0081

Source
https://advisories.mageia.org/MGASA-2016-0081.html
Import Source
https://advisories.mageia.org/MGASA-2016-0081.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2016-0081
Upstream
Published
2016-02-23T12:23:22Z
Modified
2026-04-16T06:26:24.994328793Z
Summary
Updated 389-ds-base packages fix security vulnerability
Details

An infinite-loop vulnerability was discovered in the 389 directory server, where the server failed to correctly handle unexpectedly closed client connections. A remote attacker able to connect to the server could use this flaw to make the directory server consume an excessive amount of CPU and stop accepting connections (denial of service) (CVE-2016-0741).

References
Credits

Affected packages

Mageia:5 / 389-ds-base

Package

Name
389-ds-base
Purl
pkg:rpm/mageia/389-ds-base?arch=source&distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.4.8-1.mga5

Ecosystem specific

{
    "section": "core"
}

Database specific

source
"https://advisories.mageia.org/MGASA-2016-0081.json"