Vulnerability Description
389-ds-base before versions 1.4.0.9, 1.3.8.1, 1.3.6.15 did not properly handle long search filters with characters needing escapes, possibly leading to buffer overflows. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fedoraproject | 389 Directory Server | >= 1.3.6.0, < 1.3.6.15 |
| Redhat | Enterprise Linux Desktop | 6.0 |
| Redhat | Enterprise Linux Server | 6.0 |
| Redhat | Enterprise Linux Workstation | 6.0 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/104137Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2018:1364Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:1380Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1089Issue TrackingPatch
- https://lists.debian.org/debian-lts-announce/2018/07/msg00018.htmlMailing ListThird Party Advisory
- http://www.securityfocus.com/bid/104137Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2018:1364Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:1380Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1089Issue TrackingPatch
- https://lists.debian.org/debian-lts-announce/2018/07/msg00018.htmlMailing ListThird Party Advisory
FAQ
What is CVE-2018-1089?
CVE-2018-1089 is a vulnerability with a CVSS score of 7.5 (HIGH). 389-ds-base before versions 1.4.0.9, 1.3.8.1, 1.3.6.15 did not properly handle long search filters with characters needing escapes, possibly leading to buffer overflows. A remote, unauthenticated atta...
How severe is CVE-2018-1089?
CVE-2018-1089 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-1089?
Check the references section above for vendor advisories and patch information. Affected products include: Fedoraproject 389 Directory Server, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server, Redhat Enterprise Linux Workstation, Debian Debian Linux.