Red Hat 389 Directory Server

CPE Details

Red Hat 389 Directory Server
-
2019-11-12
12h51 +00:00
2022-10-27
23h18 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:o:redhat:389_directory_server:-:*:*:*:*:*:*:*

Informations

Vendor

redhat

Product

389_directory_server

Version

-

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2024-6237 2024-07-09 16h39 +00:00 A flaw was found in the 389 Directory Server. This flaw allows an unauthenticated user to cause a systematic server crash while sending a specific extended search request, leading to a denial of service.
6.5
Moyen
CVE-2024-1062 2024-02-12 13h04 +00:00 A heap overflow flaw was found in 389-ds-base. This issue leads to a denial of service when writing a value larger than 256 chars in log_entry_attr.
5.5
Moyen
CVE-2021-3514 2021-05-27 22h00 +00:00 When using a sync_repl client in 389-ds-base, an authenticated attacker can cause a NULL pointer dereference using a specially crafted query, causing a crash.
6.5
Moyen
CVE-2020-35518 2021-03-26 15h43 +00:00 When binding against a DN during authentication, the reply from 389-ds-base will be different whether the DN exists or not. This can be used by an unauthenticated attacker to check the existence of an entry in the LDAP database.
5.3
Moyen
CVE-2010-2222 2019-11-05 18h27 +00:00 The _ger_parse_control function in Red Hat Directory Server 8 and the 389 Directory Server allows attackers to cause a denial of service (NULL pointer dereference) via a crafted search query.
7.5
Haute