CVE-2017-15134

HIGH

Fedoraproject 389 Directory Server < 1.3.6.13 - Memory Corruption

Title source: rule
STIX 2.1

Description

A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5 handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.

References (6)

Core 6
Core References
Patch, Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2018:0163
Issue Tracking, Patch x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1531573
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/102790
Mailing List mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2018/07/msg00018.html

Scores

CVSS v3 7.5
EPSS 0.0569
EPSS Percentile 90.5%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-119 CWE-120
Status published
Products (6)
fedoraproject/389_directory_server 1.3.6.1 - 1.3.6.13
redhat/enterprise_linux 7.4
redhat/enterprise_linux_desktop 7.0
redhat/enterprise_linux_server 7.0
redhat/enterprise_linux_server 7.4
redhat/enterprise_linux_workstation 7.0
Published Mar 01, 2018
Tracked Since Feb 18, 2026