389-ds-base before versions 1.4.0.9, 1.3.8.1, 1.3.6.15 did not properly handle long search filters with characters needing escapes, possibly leading to buffer overflows. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
{
"binaries": [
{
"binary_version": "1.3.4.9-1ubuntu0.1~esm1",
"binary_name": "389-ds"
},
{
"binary_version": "1.3.4.9-1ubuntu0.1~esm1",
"binary_name": "389-ds-base"
},
{
"binary_version": "1.3.4.9-1ubuntu0.1~esm1",
"binary_name": "389-ds-base-dev"
},
{
"binary_version": "1.3.4.9-1ubuntu0.1~esm1",
"binary_name": "389-ds-base-libs"
}
]
}
{
"binaries": [
{
"binary_version": "1.3.7.10-1ubuntu1+esm1",
"binary_name": "389-ds"
},
{
"binary_version": "1.3.7.10-1ubuntu1+esm1",
"binary_name": "389-ds-base"
},
{
"binary_version": "1.3.7.10-1ubuntu1+esm1",
"binary_name": "389-ds-base-dev"
},
{
"binary_version": "1.3.7.10-1ubuntu1+esm1",
"binary_name": "389-ds-base-libs"
},
{
"binary_version": "1.3.7.10-1ubuntu1+esm1",
"binary_name": "python3-dirsrvtests"
},
{
"binary_version": "1.3.7.10-1ubuntu1+esm1",
"binary_name": "python3-lib389"
}
]
}