A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5 handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
{
"binaries": [
{
"binary_name": "389-ds",
"binary_version": "1.3.4.9-1ubuntu0.1~esm1"
},
{
"binary_name": "389-ds-base",
"binary_version": "1.3.4.9-1ubuntu0.1~esm1"
},
{
"binary_name": "389-ds-base-dev",
"binary_version": "1.3.4.9-1ubuntu0.1~esm1"
},
{
"binary_name": "389-ds-base-libs",
"binary_version": "1.3.4.9-1ubuntu0.1~esm1"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "389-ds",
"binary_version": "1.3.7.9-1"
},
{
"binary_name": "389-ds-base",
"binary_version": "1.3.7.9-1"
},
{
"binary_name": "389-ds-base-dev",
"binary_version": "1.3.7.9-1"
},
{
"binary_name": "389-ds-base-libs",
"binary_version": "1.3.7.9-1"
},
{
"binary_name": "python3-dirsrvtests",
"binary_version": "1.3.7.9-1"
},
{
"binary_name": "python3-lib389",
"binary_version": "1.3.7.9-1"
}
]
}