Vulnerability Description
slapd (aka ns-slapd) in 389 Directory Server before 1.2.8.a2 does not properly manage the c_timelimit field of the connection table element, which allows remote attackers to cause a denial of service (daemon outage) via Simple Paged Results connections, as demonstrated by using multiple processes to replay TCP sessions, a different vulnerability than CVE-2011-0019.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fedoraproject | 389 Directory Server | <= 1.2.8 |
Related Weaknesses (CWE)
References
- http://directory.fedoraproject.org/wiki/Release_Notes
- http://secunia.com/advisories/43566
- https://bugzilla.redhat.com/show_bug.cgi?id=668619Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65769
- http://directory.fedoraproject.org/wiki/Release_Notes
- http://secunia.com/advisories/43566
- https://bugzilla.redhat.com/show_bug.cgi?id=668619Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65769
FAQ
What is CVE-2011-1067?
CVE-2011-1067 is a vulnerability with a CVSS score of 5.0 (MEDIUM). slapd (aka ns-slapd) in 389 Directory Server before 1.2.8.a2 does not properly manage the c_timelimit field of the connection table element, which allows remote attackers to cause a denial of service ...
How severe is CVE-2011-1067?
CVE-2011-1067 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-1067?
Check the references section above for vendor advisories and patch information. Affected products include: Fedoraproject 389 Directory Server.