Vulnerability Description
A flaw was found in 389 Directory Server. A specially crafted search query could lead to excessive CPU consumption in the do_search() function. An unauthenticated attacker could use this flaw to provoke a denial of service.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fedoraproject | 389 Directory Server | < 1.4.0.17 |
| Debian | Debian Linux | 8.0 |
| Redhat | Enterprise Linux | 7.0 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2018:3127Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:3507Issue TrackingThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14648Third Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/10/msg00015.htmlThird Party Advisory
- https://access.redhat.com/errata/RHSA-2018:3127Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:3507Issue TrackingThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14648Third Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/10/msg00015.htmlThird Party Advisory
FAQ
What is CVE-2018-14648?
CVE-2018-14648 is a vulnerability with a CVSS score of 7.5 (HIGH). A flaw was found in 389 Directory Server. A specially crafted search query could lead to excessive CPU consumption in the do_search() function. An unauthenticated attacker could use this flaw to provo...
How severe is CVE-2018-14648?
CVE-2018-14648 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-14648?
Check the references section above for vendor advisories and patch information. Affected products include: Fedoraproject 389 Directory Server, Debian Debian Linux, Redhat Enterprise Linux.