CVE-2018-1089
HIGHFedoraproject 389 Directory Server < 1.3.6.15 - Memory Corruption
Title source: ruleDescription
389-ds-base before versions 1.4.0.9, 1.3.8.1, 1.3.6.15 did not properly handle long search filters with characters needing escapes, possibly leading to buffer overflows. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
References (5)
Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/104137
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2018:1364
Issue Tracking, Patch x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1089
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2018:1380
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2018/07/msg00018.html
Scores
CVSS v3
7.5
EPSS
0.1457
EPSS Percentile
94.5%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-119
CWE-122
Status
published
Products (10)
debian/debian_linux
8.0
fedoraproject/389_directory_server
1.3.8.1
fedoraproject/389_directory_server
1.3.8.2
fedoraproject/389_directory_server
1.3.6.0 - 1.3.6.15
redhat/enterprise_linux_desktop
6.0
redhat/enterprise_linux_desktop
7.0
redhat/enterprise_linux_server
6.0
redhat/enterprise_linux_server
7.0
redhat/enterprise_linux_workstation
6.0
redhat/enterprise_linux_workstation
7.0
Published
May 09, 2018
Tracked Since
Feb 18, 2026