A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5 handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1.3.7.9-1", "binary_name": "389-ds" }, { "binary_version": "1.3.7.9-1", "binary_name": "389-ds-base" }, { "binary_version": "1.3.7.9-1", "binary_name": "389-ds-base-dbgsym" }, { "binary_version": "1.3.7.9-1", "binary_name": "389-ds-base-dev" }, { "binary_version": "1.3.7.9-1", "binary_name": "389-ds-base-libs" }, { "binary_version": "1.3.7.9-1", "binary_name": "389-ds-base-libs-dbgsym" }, { "binary_version": "1.3.7.9-1", "binary_name": "python3-dirsrvtests" }, { "binary_version": "1.3.7.9-1", "binary_name": "python3-lib389" } ] }