Vulnerability Description
A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5 handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fedoraproject | 389 Directory Server | >= 1.3.6.1, < 1.3.6.13 |
| Redhat | Enterprise Linux | 7.4 |
| Redhat | Enterprise Linux Desktop | 7.0 |
| Redhat | Enterprise Linux Server | 7.0 |
| Redhat | Enterprise Linux Workstation | 7.0 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00033.html
- http://www.securityfocus.com/bid/102790Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2018:0163PatchVendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1531573Issue TrackingPatch
- https://lists.debian.org/debian-lts-announce/2018/07/msg00018.html
- https://pagure.io/389-ds-base/c/6aa2acdc3cad9Patch
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00033.html
- http://www.securityfocus.com/bid/102790Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2018:0163PatchVendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1531573Issue TrackingPatch
- https://lists.debian.org/debian-lts-announce/2018/07/msg00018.html
- https://pagure.io/389-ds-base/c/6aa2acdc3cad9Patch
FAQ
What is CVE-2017-15134?
CVE-2017-15134 is a vulnerability with a CVSS score of 7.5 (HIGH). A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5 handled certain LDAP search filters. A remote, unauthenticated attac...
How severe is CVE-2017-15134?
CVE-2017-15134 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-15134?
Check the references section above for vendor advisories and patch information. Affected products include: Fedoraproject 389 Directory Server, Redhat Enterprise Linux, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server, Redhat Enterprise Linux Workstation.