389-ds-base before version 1.3.6 is vulnerable to an improperly NULL terminated array in the uniqueness_entry_to_config() function in the "attribute uniqueness" plugin of 389 Directory Server. An authenticated, or possibly unauthenticated, attacker could use this flaw to force an out-of-bound heap memory read, possibly triggering a crash of the LDAP service.
Advisories
Source ID Title
EUVD EUVD EUVD-2017-11769 389-ds-base before version 1.3.6 is vulnerable to an improperly NULL terminated array in the uniqueness_entry_to_config() function in the "attribute uniqueness" plugin of 389 Directory Server. An authenticated, or possibly unauthenticated, attacker could use this flaw to force an out-of-bound heap memory read, possibly triggering a crash of the LDAP service.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-05T14:02:06.992Z

Reserved: 2016-12-01T00:00:00

Link: CVE-2017-2591

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-04-30T12:29:00.220

Modified: 2024-11-21T03:23:47.293

Link: CVE-2017-2591

cve-icon Redhat

Severity : Low

Publid Date: 2016-09-13T00:00:00Z

Links: CVE-2017-2591 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses