Search CVE reports


Toggle filters

11 – 20 of 55 results


CVE-2022-1949

Medium priority
Needs evaluation

An access control bypass vulnerability found in 389-ds-base. That mishandling of the filter that would yield incorrect results, but as that has progressed, can be determined that it actually is an access control bypass. This may...

1 affected package

389-ds-base

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
389-ds-base Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2021-3652

Low priority
Not affected

A flaw was found in 389-ds-base. If an asterisk is imported as password hashes, either accidentally or maliciously, then instead of being inactive, any password will successfully match during authentication. This flaw allows an...

1 affected package

389-ds-base

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
389-ds-base Not affected Not affected Not affected
Show less packages

CVE-2022-0996

Medium priority
Needs evaluation

A vulnerability was found in the 389 Directory Server that allows expired passwords to access the database to cause improper authentication.

1 affected package

389-ds-base

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
389-ds-base Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2022-0918

Medium priority
Needs evaluation

A vulnerability was discovered in the 389 Directory Server that allows an unauthenticated attacker with network access to the LDAP port to cause a denial of service. The denial of service is triggered by a single message sent over...

1 affected package

389-ds-base

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
389-ds-base Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2021-4091

Medium priority
Needs evaluation

A double-free was found in the way 389-ds-base handles virtual attributes context in persistent searches. An attacker could send a series of search requests, forcing the server to behave unexpectedly, and crash.

1 affected package

389-ds-base

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
389-ds-base Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2021-3514

Medium priority

Some fixes available 4 of 6

When using a sync_repl client in 389-ds-base, an authenticated attacker can cause a NULL pointer dereference using a specially crafted query, causing a crash.

1 affected package

389-ds-base

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
389-ds-base Not affected Not affected Fixed Fixed
Show less packages

CVE-2020-35518

Medium priority

Some fixes available 1 of 2

When binding against a DN during authentication, the reply from 389-ds-base will be different whether the DN exists or not. This can be used by an unauthenticated attacker to check the existence of an entry in the LDAP database.

1 affected package

389-ds-base

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
389-ds-base Not affected Not affected Fixed Not affected
Show less packages

CVE-2019-10224

Low priority
Vulnerable

A flaw has been found in 389-ds-base versions 1.4.x.x before 1.4.1.3. When executed in verbose mode, the dscreate and dsconf commands may display sensitive information, such as the Directory Manager password. An attacker, able to...

2 affected packages

389-ds-base, python-lib389

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
389-ds-base Not affected Not affected Not affected Vulnerable
python-lib389 Not in release Not in release Not in release Not in release
Show less packages

CVE-2019-14824

Medium priority
Vulnerable

A flaw was found in the 'deref' plugin of 389-ds-base where it could use the 'search' permission to display attribute values. In some configurations, this could allow an authenticated attacker to view private attributes, such as...

1 affected package

389-ds-base

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
389-ds-base Not affected Not affected Not affected Vulnerable
Show less packages

CVE-2019-10171

Medium priority
Not affected

It was found that the fix for CVE-2018-14648 in 389-ds-base, versions 1.4.0.x before 1.4.0.17, was incorrectly applied in RHEL 7.5. An attacker would still be able to provoke excessive CPU consumption leading to a denial of service.

1 affected package

389-ds-base

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
389-ds-base Not affected
Show less packages