Red Hat Directory Server 12.0

CPE Details

Red Hat Directory Server 12.0
12.0
2022-06-08
12h02 +00:00
2022-08-26
18h26 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:redhat:directory_server:12.0:*:*:*:*:*:*:*

Informations

Vendor

redhat

Product

directory_server

Version

12.0

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2024-6237 2024-07-09 16h39 +00:00 A flaw was found in the 389 Directory Server. This flaw allows an unauthenticated user to cause a systematic server crash while sending a specific extended search request, leading to a denial of service.
6.5
Moyen
CVE-2024-1062 2024-02-12 13h04 +00:00 A heap overflow flaw was found in 389-ds-base. This issue leads to a denial of service when writing a value larger than 256 chars in log_entry_attr.
5.5
Moyen
CVE-2023-1055 2023-02-27 00h00 +00:00 A flaw was found in RHDS 11 and RHDS 12. While browsing entries LDAP tries to decode the userPassword attribute instead of the userCertificate attribute which could lead into sensitive information leaked. An attacker with a local account where the cockpit-389-ds is running can list the processes and display the hashed passwords. The highest threat from this vulnerability is to data confidentiality.
5.5
Moyen
CVE-2022-2850 2022-10-14 00h00 +00:00 A flaw was found In 389-ds-base. When the Content Synchronization plugin is enabled, an authenticated user can reach a NULL pointer dereference using a specially crafted query. This flaw allows an authenticated attacker to cause a denial of service. This CVE is assigned against an incomplete fix of CVE-2021-3514.
6.5
Moyen
CVE-2022-1949 2022-06-01 13h08 +00:00 An access control bypass vulnerability found in 389-ds-base. That mishandling of the filter that would yield incorrect results, but as that has progressed, can be determined that it actually is an access control bypass. This may allow any remote unauthenticated user to issue a filter that allows searching for database items they do not have access to, including but not limited to potentially userPassword hashes and other sensitive data.
7.5
Haute