|Max CVSS||7.8||Min CVSS||3.5||Total Count||2|
|ID||CVSS||Summary||Last (major) update||Published|
A flaw was found in the 'deref' plugin of 389-ds-base where it could use the 'search' permission to display attribute values. In some configurations, this could allow an authenticated attacker to view private attributes, such as password hashes.
|04-12-2020 - 18:15||08-11-2019 - 15:15|
In 389-ds-base up to version 188.8.131.52, requests are handled by workers threads. Each sockets will be waited by the worker for at most 'ioblocktimeout' seconds. However this timeout applies only for un-encrypted requests. Connections using SSL/TLS are
|13-11-2020 - 16:15||17-04-2019 - 14:29|
389-ds-base before versions 184.108.40.206, 220.127.116.11, 18.104.22.168 did not properly handle long search filters with characters needing escapes, possibly leading to buffer overflows. A remote, unauthenticated attacker could potentially use this flaw to make ns-sl
|09-10-2019 - 23:38||09-05-2018 - 15:29|
A flaw was found in 389-ds-base before version 22.214.171.124-13. The process ns-slapd crashes in delete_passwdPolicy function when persistent search connections are terminated unexpectedly leading to remote denial of service.
|09-10-2019 - 23:35||14-09-2018 - 19:29|
A flaw was found in 389 Directory Server. A specially crafted search query could lead to excessive CPU consumption in the do_search() function. An unauthenticated attacker could use this flaw to provoke a denial of service.
|09-10-2019 - 23:35||28-09-2018 - 13:29|
389-ds-base before versions 126.96.36.199 and 188.8.131.52 is vulnerable to an invalid pointer dereference in the way LDAP bind requests are handled. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bin
|09-10-2019 - 23:27||22-06-2018 - 13:29|
A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 184.108.40.206, 1.3.7.x before 220.127.116.11, 1.4.x before 18.104.22.168 handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-sla
|15-05-2019 - 21:29||01-03-2018 - 22:29|
389 Directory Server in Red Hat Enterprise Linux Desktop 6 through 7, Red Hat Enterprise Linux HPC Node 6 through 7, Red Hat Enterprise Linux Server 6 through 7, and Red Hat Enterprise Linux Workstation 6 through 7 allows remote attackers to read the
|16-04-2019 - 20:30||08-06-2017 - 19:29|
An out-of-bounds memory read flaw was found in the way 389-ds-base handled certain LDAP search filters, affecting all versions including 1.4.x. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially
|17-07-2018 - 01:29||07-03-2018 - 13:29|
389-ds-base version before 22.214.171.124 and 126.96.36.199 are vulnerable to password brute-force attacks during account lockout due to different return codes returned on password attempts.
|05-01-2018 - 02:31||16-08-2017 - 18:29|