Red Hat Directory Server

CPE Details

Red Hat Directory Server
-
2008-04-15
20h37 +00:00
2008-04-15
20h37 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:redhat:directory_server:-:*:*:*:*:*:*:*

Informations

Vendor

redhat

Product

directory_server

Version

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-1062 2024-02-12 13h04 +00:00 A heap overflow flaw was found in 389-ds-base. This issue leads to a denial of service when writing a value larger than 256 chars in log_entry_attr.
5.5
Medium
CVE-2013-4485 2013-11-23 10h00 +00:00 389 Directory Server 1.2.11.15 (aka Red Hat Directory Server before 8.2.11-14) allows remote authenticated users to cause a denial of service (crash) via multiple @ characters in a GER attribute list in a search request.
4
CVE-2013-2219 2013-07-31 08h00 +00:00 The Red Hat Directory Server before 8.2.11-13 and 389 Directory Server do not properly restrict access to entity attributes, which allows remote authenticated users to obtain sensitive information via a search query for the attribute.
4
CVE-2012-2678 2012-07-03 14h00 +00:00 389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), after the password for a LDAP user has been changed and before the server has been reset, allows remote attackers to read the plaintext password via the unhashed#user#password attribute.
1.2
CVE-2012-2746 2012-07-03 14h00 +00:00 389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), when the password of a LDAP user has been changed and audit logging is enabled, saves the new password to the log in plain text, which allows remote authenticated users to read the password.
2.1