Vulnerability Description
slapd (aka ns-slapd) in 389 Directory Server 1.2.7.5 (aka Red Hat Directory Server 8.2.x or dirsrv) does not properly handle simple paged result searches, which allows remote attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact via multiple search requests.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fedoraproject | 389 Directory Server | 1.2.7.5 |
| Redhat | Directory Server | 8.2 |
Related Weaknesses (CWE)
References
- http://www.redhat.com/support/errata/RHSA-2011-0293.html
- http://www.securityfocus.com/bid/46489
- http://www.securitytracker.com/id?1025102
- https://bugzilla.redhat.com/show_bug.cgi?id=666076
- https://bugzilla.redhat.com/show_bug.cgi?id=670914
- http://www.redhat.com/support/errata/RHSA-2011-0293.html
- http://www.securityfocus.com/bid/46489
- http://www.securitytracker.com/id?1025102
- https://bugzilla.redhat.com/show_bug.cgi?id=666076
- https://bugzilla.redhat.com/show_bug.cgi?id=670914
FAQ
What is CVE-2011-0019?
CVE-2011-0019 is a vulnerability with a CVSS score of 7.5 (HIGH). slapd (aka ns-slapd) in 389 Directory Server 1.2.7.5 (aka Red Hat Directory Server 8.2.x or dirsrv) does not properly handle simple paged result searches, which allows remote attackers to cause a deni...
How severe is CVE-2011-0019?
CVE-2011-0019 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-0019?
Check the references section above for vendor advisories and patch information. Affected products include: Fedoraproject 389 Directory Server, Redhat Directory Server.