An out-of-bounds memory read flaw was found in the way 389-ds-base handled certain LDAP search filters, affecting all versions including 1.4.x. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_name": "389-ds", "binary_version": "1.3.7.10-1" }, { "binary_name": "389-ds-base", "binary_version": "1.3.7.10-1" }, { "binary_name": "389-ds-base-dbgsym", "binary_version": "1.3.7.10-1" }, { "binary_name": "389-ds-base-dev", "binary_version": "1.3.7.10-1" }, { "binary_name": "389-ds-base-libs", "binary_version": "1.3.7.10-1" }, { "binary_name": "389-ds-base-libs-dbgsym", "binary_version": "1.3.7.10-1" }, { "binary_name": "python3-dirsrvtests", "binary_version": "1.3.7.10-1" }, { "binary_name": "python3-lib389", "binary_version": "1.3.7.10-1" } ] }