389-ds-base before versions 1.4.0.9, 1.3.8.1, 1.3.6.15 did not properly handle long search filters with characters needing escapes, possibly leading to buffer overflows. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2018-05-09T15:00:00
Updated: 2024-08-05T03:51:48.500Z
Reserved: 2017-12-04T00:00:00
Link: CVE-2018-1089
Vulnrichment
No data.
NVD
Status : Modified
Published: 2018-05-09T15:29:00.207
Modified: 2024-11-21T03:59:09.490
Link: CVE-2018-1089
Redhat