Red Hat 389 Directory Server

CPE Details

Red Hat 389 Directory Server
-
2019-11-12
12h51 +00:00
2022-10-27
23h18 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:o:redhat:389_directory_server:-:*:*:*:*:*:*:*

Informations

Vendor

redhat

Product

389_directory_server

Version

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-6237 2024-07-09 16h39 +00:00 A flaw was found in the 389 Directory Server. This flaw allows an unauthenticated user to cause a systematic server crash while sending a specific extended search request, leading to a denial of service.
6.5
Medium
CVE-2024-1062 2024-02-12 13h04 +00:00 A heap overflow flaw was found in 389-ds-base. This issue leads to a denial of service when writing a value larger than 256 chars in log_entry_attr.
5.5
Medium
CVE-2021-3514 2021-05-27 22h00 +00:00 When using a sync_repl client in 389-ds-base, an authenticated attacker can cause a NULL pointer dereference using a specially crafted query, causing a crash.
6.5
Medium
CVE-2020-35518 2021-03-26 15h43 +00:00 When binding against a DN during authentication, the reply from 389-ds-base will be different whether the DN exists or not. This can be used by an unauthenticated attacker to check the existence of an entry in the LDAP database.
5.3
Medium
CVE-2010-2222 2019-11-05 18h27 +00:00 The _ger_parse_control function in Red Hat Directory Server 8 and the 389 Directory Server allows attackers to cause a denial of service (NULL pointer dereference) via a crafted search query.
7.5
High