A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5 handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_name": "389-ds", "binary_version": "1.3.7.9-1" }, { "binary_name": "389-ds-base", "binary_version": "1.3.7.9-1" }, { "binary_name": "389-ds-base-dbgsym", "binary_version": "1.3.7.9-1" }, { "binary_name": "389-ds-base-dev", "binary_version": "1.3.7.9-1" }, { "binary_name": "389-ds-base-libs", "binary_version": "1.3.7.9-1" }, { "binary_name": "389-ds-base-libs-dbgsym", "binary_version": "1.3.7.9-1" }, { "binary_name": "python3-dirsrvtests", "binary_version": "1.3.7.9-1" }, { "binary_name": "python3-lib389", "binary_version": "1.3.7.9-1" } ] }