ID CVE-2018-14638
Summary A flaw was found in 389-ds-base before version 1.3.8.4-13. The process ns-slapd crashes in delete_passwdPolicy function when persistent search connections are terminated unexpectedly leading to remote denial of service.
References
Vulnerable Configurations
  • Fedora Project 389 Directory Server 1.1.46
    cpe:2.3:a:fedoraproject:389_directory_server:1.1.46
  • Fedora Project 389 Directory Server 1.2.1
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.1
  • Fedora Project 389 Directory Server 1.2.2
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.2
  • Fedora Project 389 Directory Server 1.2.3
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.3
  • Fedora Project 389 Directory Server 1.2.5
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.5
  • Fedora Project 389 Directory Server 1.2.5 Release Candidate 1
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc1
  • Fedora Project 389 Directory Server 1.2.5 Release Candidate 2
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc2
  • Fedora Project 389 Directory Server 1.2.5 Release Candidate 3
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc3
  • Fedora Project 389 Directory Server 1.2.5 Release Candidate 4
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc4
  • Fedora Project 389 Directory Server 1.2.6
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.6
  • Fedora Project 389 Directory Server 1.2.6 a2
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a2
  • Fedora Project 389 Directory Server 1.2.6 a3
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a3
  • Fedora Project 389 Directory Server 1.2.6 a4
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a4
  • Fedora Project 389 Directory Server 1.2.6 Release Candidate 1
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc1
  • Fedora Project 389 Directory Server 1.2.6 Release Candidate 2
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc2
  • Fedora Project 389 Directory Server 1.2.6 Release Candidate 3
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc3
  • Fedora Project 389 Directory Server 1.2.6 Release Candidate 6
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc6
  • Fedora Project 389 Directory Server 1.2.6 Release Candidate 7
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc7
  • Fedora Project 389 Directory Server 1.2.6.1
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.6.1
  • Fedora Project 389 Directory Server 1.2.7 Alpha 3
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.7:alpha3
  • Fedora Project 389 Directory Server 1.2.7.5
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.7.5
  • Fedora Project 389 Directory Server 1.2.8 Alpha 1
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha1
  • Fedora Project 389 Directory Server 1.2.8 Alpha 2
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha2
  • Fedora Project 389 Directory Server 1.2.8 Alpha 3
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha3
  • Fedora Project 389 Directory Server 1.2.8 Release Candidate 1
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:rc1
  • Fedora Project 389 Directory Server 1.2.8 Release Candidate 2
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:rc2
  • Fedora Project 389 Directory Server 1.2.8.1
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.1
  • Fedora Project 389 Directory Server 1.2.8.2
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.2
  • Fedora Project 389 Directory Server 1.2.8.3
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.3
  • Fedora Project 389 Directory Server 1.2.9.9
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.9.9
  • Fedora Project 389 Directory Server 1.2.10
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.10
  • Fedora Project 389 Directory Server 1.2.10 alpha8
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:alpha8
  • Fedora Project 389 Directory Server 1.2.10 release candidate 1
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:rc1
  • Fedora Project 389 Directory Server 1.2.10.2
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.2
  • Fedora Project 389 Directory Server 1.2.10.3
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.3
  • Fedora Project 389 Directory Server 1.2.10.4
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.4
  • Fedora Project 389 Directory Server 1.2.10.11
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.11
  • Fedora Project 389 Directory Server 1.2.11.1
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.1
  • Fedora Project 389 Directory Server 1.2.11.5
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.5
  • Fedora Project 389 Directory Server 1.2.11.6
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.6
  • Fedora Project 389 Directory Server 1.2.11.8
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.8
  • Fedora Project 389 Directory Server 1.2.11.9
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.9
  • Fedora Project 389 Directory Server 1.2.11.10
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.10
  • Fedora Project 389 Directory Server 1.2.11.11
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.11
  • Fedora Project 389 Directory Server 1.2.11.12
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.12
  • Fedora Project 389 Directory Server 1.2.11.13
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.13
  • Fedora Project 389 Directory Server 1.2.11.14
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.14
  • Fedora Project 389 Directory Server 1.2.11.15
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.15
  • Fedora Project 389 Directory Server 1.2.11.17
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.17
  • Fedora Project 389 Directory Server 1.2.11.19
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.19
  • Fedora Project 389 Directory Server 1.2.11.20
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.20
  • Fedora Project 389 Directory Server 1.2.11.21
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.21
  • Fedora Project 389 Directory Server 1.2.11.22
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.22
  • Fedora Project 389 Directory Server 1.2.11.23
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.23
  • Fedora Project 389 Directory Server 1.2.11.25
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.25
  • Fedora Project 389 Directory Server 1.2.11.26
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.26
  • Fedora Project 389 Directory Server 1.2.16
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.16
  • Fedora Project 389 Directory Server 1.3.0.2
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.2
  • Fedora Project 389 Directory Server 1.3.0.3
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.3
  • Fedora Project 389 Directory Server 1.3.0.4
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.4
  • Fedora Project 389 Directory Server 1.3.0.5
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.5
  • Fedora Project 389 Directory Server 1.3.0.6
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.6
  • Fedora Project 389 Directory Server 1.3.0.7
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.7
  • Fedora Project 389 Directory Server 1.3.0.8
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.8
  • Fedora Project 389 Directory Server 1.3.1.0
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.0
  • Fedora Project 389 Directory Server 1.3.1.1
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.1
  • Fedora Project 389 Directory Server 1.3.1.2
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.2
  • Fedora Project 389 Directory Server 1.3.1.3
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.3
  • Fedora Project 389 Directory Server 1.3.1.4
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.4
  • Fedora Project 389 Directory Server 1.3.1.5
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.5
  • Fedora Project 389 Directory Server 1.3.1.6
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.6
  • Fedora Project 389 Directory Server 1.3.1.7
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.7
  • Fedora Project 389 Directory Server 1.3.1.8
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.8
  • Fedora Project 389 Directory Server 1.3.1.9
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.9
  • Fedora Project 389 Directory Server 1.3.1.10
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.10
  • Fedora Project 389 Directory Server 1.3.1.11
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.11
  • Fedora Project 389 Directory Server 1.3.1.12
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.12
  • Fedora Project 389 Directory Server 1.3.1.13
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.13
  • Fedora Project 389 Directory Server 1.3.1.14
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.14
  • Fedora Project 389 Directory Server 1.3.1.15
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.15
  • Fedora Project 389 Directory Server 1.3.1.16
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.16
  • Fedora Project 389 Directory Server 1.3.1.17
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.17
  • Fedora Project 389 Directory Server 1.3.1.18
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.18
  • Fedora Project 389 Directory Server 1.3.1.19
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.19
  • Fedora Project 389 Directory Server 1.3.1.22
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.22
  • Fedora Project 389 Directory Server 1.3.2.2
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.2
  • Fedora Project 389 Directory Server 1.3.2.3
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.3
  • Fedora Project 389 Directory Server 1.3.2.4
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.4
  • Fedora Project 389 Directory Server 1.3.2.5
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.5
  • Fedora Project 389 Directory Server 1.3.2.6
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.6
  • Fedora Project 389 Directory Server 1.3.2.7
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.7
  • Fedora Project 389 Directory Server 1.3.2.8
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.8
  • Fedora Project 389 Directory Server 1.3.2.9
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.9
  • Fedora Project 389 Directory Server 1.3.2.10
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.10
  • Fedora Project 389 Directory Server 1.3.2.11
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.11
  • Fedora Project 389 Directory Server 1.3.2.13
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.13
  • Fedora Project 389 Directory Server 1.3.2.16
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.16
  • Fedora Project 389 Directory Server 1.3.2.19
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.19
  • Fedora Project 389 Directory Server 1.3.2.22
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.22
  • Fedora Project 389 Directory Server 1.3.2.23
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.23
  • Fedora Project 389 Directory Server 1.3.2.24
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.24
  • Fedora Project 389 Directory Server 1.3.2.26
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.26
  • Fedora Project 389 Directory Server 1.3.2.27
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.27
  • Fedora Project 389 Directory Server 1.3.3.0
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.3.0
  • Fedora Project 389 Directory Server 1.3.3.2
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.3.2
  • Fedora Project 389 Directory Server 1.3.3.3
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.3.3
  • Fedora Project 389 Directory Server 1.3.3.5
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.3.5
  • Fedora Project 389 Directory Server 1.3.3.8
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.3.8
  • Fedora Project 389 Directory Server 1.3.3.9
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.3.9
  • Fedora Project 389 Directory Server 1.3.3.10
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.3.10
  • Fedora Project 389 Directory Server 1.3.3.11
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.3.11
  • Fedora Project 389 Directory Server 1.3.3.12
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.3.12
  • Fedora Project 389 Directory Server 1.3.3.13
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.3.13
  • Fedora Project 389 Directory Server 1.3.3.14
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.3.14
  • Fedora Project 389 Directory Server 1.3.4.0
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.4.0
  • Fedora Project 389 Directory Server 1.3.4.1
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.4.1
  • Fedora Project 389 Directory Server 1.3.4.4
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.4.4
  • Fedora Project 389 Directory Server 1.3.4.5
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.4.5
  • Fedora Project 389 Directory Server 1.3.4.8
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.4.8
  • Fedora Project 389 Directory Server 1.3.4.9
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.4.9
  • Fedora Project 389 Directory Server 1.3.4.14
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.4.14
  • Fedora Project 389 Directory Server 1.3.5.2
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.5.2
  • Fedora Project 389 Directory Server 1.3.5.3
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.5.3
  • Fedora Project 389 Directory Server 1.3.5.4
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.5.4
  • Fedora Project 389 Directory Server 1.3.5.13
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.5.13
  • Fedora Project 389 Directory Server 1.3.5.14
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.5.14
  • Fedora Project 389 Directory Server 1.3.5.15
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.5.15
  • Fedora Project 389 Directory Server 1.3.5.16
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.5.16
  • Fedora Project 389 Directory Server 1.3.5.17
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.5.17
  • Fedora Project 389 Directory Server 1.3.5.18
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.5.18
  • Fedora Project 389 Directory Server 1.3.5.19
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.5.19
  • Fedora Project 389 Directory Server 1.3.6
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6
  • Fedora Project 389 Directory Server 1.3.6.0
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.0
  • Fedora Project 389 Directory Server 1.3.6.1
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.1
  • Fedora Project 389 Directory Server 1.3.6.2
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.2
  • Fedora Project 389 Directory Server 1.3.6.3
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.3
  • Fedora Project 389 Directory Server 1.3.6.4
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.4
  • Fedora Project 389 Directory Server 1.3.6.5
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.5
  • Fedora Project 389 Directory Server 1.3.6.6
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.6
  • Fedora Project 389 Directory Server 1.3.6.7
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.7
  • Fedora Project 389 Directory Server 1.3.6.8
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.8
  • Fedora Project 389 Directory Server 1.3.6.9
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.9
  • Fedora Project 389 Directory Server 1.3.6.10
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.10
  • Fedora Project 389 Directory Server 1.3.6.11
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.11
  • Fedora Project 389 Directory Server 1.3.6.12
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.12
  • Fedora Project 389 Directory Server 1.3.6.13
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.13
  • Fedora Project 389 Directory Server 1.3.6.14
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.14
  • Fedora Project 389 Directory Server 1.3.6.15
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.15
  • Fedora Project 389 Directory Server 1.3.7.1
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.7.1
  • Fedora Project 389 Directory Server 1.3.7.2
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.7.2
  • Fedora Project 389 Directory Server 1.3.7.3
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.7.3
  • Fedora Project 389 Directory Server 1.3.7.4
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.7.4
  • Fedora Project 389 Directory Server 1.3.7.5
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.7.5
  • Fedora Project 389 Directory Server 1.3.7.6
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.7.6
  • Fedora Project 389 Directory Server 1.3.7.7
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.7.7
  • Fedora Project 389 Directory Server 1.3.7.8
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.7.8
  • Fedora Project 389 Directory Server 1.3.7.9
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.7.9
  • Fedora Project 389 Directory Server 1.3.7.10
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.7.10
  • Fedora Project 389 Directory Server 1.3.8.1
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.8.1
  • Fedora Project 389 Directory Server 1.3.8.2
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.8.2
  • Fedora Project 389 Directory Server 1.3.8.3
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.8.3
  • Red Hat Enterprise Linux Advanced mission critical Update Support (AUS) 7.6
    cpe:2.3:o:redhat:enterprise_linux_aus:7.6
  • RedHat Enterprise Linux Desktop 7.0
    cpe:2.3:o:redhat:enterprise_linux_desktop:7.0
  • RedHat Enterprise Linux Server 7.0
    cpe:2.3:o:redhat:enterprise_linux_server:7.0
  • Red Hat Enterprise Linux Server Extended Update Support (EUS) 7.5
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5
  • Red Hat Enterprise Linux Server Extended Update Support (EUS) 7.6
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6
  • Red Hat Enterprise Linux Server Telecommunications Update Service (TUS) 7.6
    cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6
  • RedHat Enterprise Linux Workstation 7.0
    cpe:2.3:o:redhat:enterprise_linux_workstation:7.0
CVSS
Base: 5.0
Impact:
Exploitability:
CWE CWE-415
CAPEC
nessus via4
  • NASL family Amazon Linux Local Security Checks
    NASL id AL2_ALAS-2018-1094.NASL
    description A vulnerability was discovered in 389-ds-base. The lock controlling the error log was not correctly used when re-opening the log file in log__error_emergency(). An attacker could send a flood of modifications to a very large DN, which would cause slapd to crash.(CVE-2018-14624) A race condition was found in the way 389-ds-base handles persistent search, resulting in a crash if the server is under load. An anonymous attacker could use this flaw to trigger a denial of service.(CVE-2018-10850) A double-free of a password policy structure was found in the way slapd was handling certain errors during persistent search. A unauthenticated attacker could use this flaw to crash Directory Server.(CVE-2018-14638) A flaw was found in the 389 Directory Server that allows users to cause a crash in the LDAP server using ldapsearch with server side sort.(CVE-2018-10935)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 118401
    published 2018-10-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118401
    title Amazon Linux 2 : 389-ds-base (ALAS-2018-1094)
  • NASL family Huawei Local Security Checks
    NASL id EULEROS_SA-2018-1365.NASL
    description According to the versions of the 389-ds-base packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - race condition on reference counter leads to DoS using persistent search (CVE-2018-10850) - ldapsearch with server side sort allows users to cause a crash (CVE-2018-10935) - Server crash through modify command with large DN (CVE-2018-14624) - Crash in delete_passwdPolicy when persistent search connections are terminated unexpectedly (CVE-2018-14638) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-13
    plugin id 118759
    published 2018-11-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118759
    title EulerOS 2.0 SP3 : 389-ds-base (EulerOS-SA-2018-1365)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20180925_389_DS_BASE_ON_SL7_X.NASL
    description Security Fix(es) : - 389-ds-base: race condition on reference counter leads to DoS using persistent search (CVE-2018-10850) - 389-ds-base: ldapsearch with server side sort allows users to cause a crash (CVE-2018-10935) - 389-ds-base: Server crash through modify command with large DN (CVE-2018-14624) - 389-ds-base: Crash in delete_passwdPolicy when persistent search connections are terminated unexpectedly (CVE-2018-14638) Bug Fix(es) : - Previously, the nucn-stans framework was enabled by default in Directory Server, but the framework is not stable. As a consequence, deadlocks and file descriptor leaks could occur. This update changes the default value of the nsslapd-enable-nunc-stans parameter to 'off'. As a result, Directory Server is now stable. - When a search evaluates the 'shadowAccount' entry, Directory Server adds the shadow attributes to the entry. If the fine-grained password policy is enabled, the 'shadowAccount' entry can contain its own 'pwdpolicysubentry' policy attribute. Previously, to retrieve this attribute, the server started an internal search for each 'shadowAccount' entry, which was unnecessary because the entry was already known to the server. With this update, Directory Server only starts internal searches if the entry is not known. As a result, the performance of searches, such as response time and throughput, is improved.
    last seen 2019-02-21
    modified 2018-12-27
    plugin id 117785
    published 2018-09-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=117785
    title Scientific Linux Security Update : 389-ds-base on SL7.x x86_64
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2018-2757.NASL
    description An update for 389-ds-base is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es) : * 389-ds-base: race condition on reference counter leads to DoS using persistent search (CVE-2018-10850) * 389-ds-base: ldapsearch with server side sort allows users to cause a crash (CVE-2018-10935) * 389-ds-base: Server crash through modify command with large DN (CVE-2018-14624) * 389-ds-base: Crash in delete_passwdPolicy when persistent search connections are terminated unexpectedly (CVE-2018-14638) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. The CVE-2018-10850 issue was discovered by Thierry Bordaz (Red Hat) and the CVE-2018-14638 issue was discovered by Viktor Ashirov (Red Hat). Bug Fix(es) : * Previously, the nucn-stans framework was enabled by default in Directory Server, but the framework is not stable. As a consequence, deadlocks and file descriptor leaks could occur. This update changes the default value of the nsslapd-enable-nunc-stans parameter to 'off'. As a result, Directory Server is now stable. (BZ#1614836) * When a search evaluates the 'shadowAccount' entry, Directory Server adds the shadow attributes to the entry. If the fine-grained password policy is enabled, the 'shadowAccount' entry can contain its own 'pwdpolicysubentry' policy attribute. Previously, to retrieve this attribute, the server started an internal search for each 'shadowAccount' entry, which was unnecessary because the entry was already known to the server. With this update, Directory Server only starts internal searches if the entry is not known. As a result, the performance of searches, such as response time and throughput, is improved. (BZ#1615924)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 117830
    published 2018-10-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=117830
    title CentOS 7 : 389-ds-base (CESA-2018:2757)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2018-2757.NASL
    description An update for 389-ds-base is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es) : * 389-ds-base: race condition on reference counter leads to DoS using persistent search (CVE-2018-10850) * 389-ds-base: ldapsearch with server side sort allows users to cause a crash (CVE-2018-10935) * 389-ds-base: Server crash through modify command with large DN (CVE-2018-14624) * 389-ds-base: Crash in delete_passwdPolicy when persistent search connections are terminated unexpectedly (CVE-2018-14638) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. The CVE-2018-10850 issue was discovered by Thierry Bordaz (Red Hat) and the CVE-2018-14638 issue was discovered by Viktor Ashirov (Red Hat). Bug Fix(es) : * Previously, the nucn-stans framework was enabled by default in Directory Server, but the framework is not stable. As a consequence, deadlocks and file descriptor leaks could occur. This update changes the default value of the nsslapd-enable-nunc-stans parameter to 'off'. As a result, Directory Server is now stable. (BZ#1614836) * When a search evaluates the 'shadowAccount' entry, Directory Server adds the shadow attributes to the entry. If the fine-grained password policy is enabled, the 'shadowAccount' entry can contain its own 'pwdpolicysubentry' policy attribute. Previously, to retrieve this attribute, the server started an internal search for each 'shadowAccount' entry, which was unnecessary because the entry was already known to the server. With this update, Directory Server only starts internal searches if the entry is not known. As a result, the performance of searches, such as response time and throughput, is improved. (BZ#1615924)
    last seen 2019-02-21
    modified 2018-11-26
    plugin id 117774
    published 2018-09-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=117774
    title RHEL 7 : 389-ds-base (RHSA-2018:2757)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2018-2757.NASL
    description From Red Hat Security Advisory 2018:2757 : An update for 389-ds-base is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es) : * 389-ds-base: race condition on reference counter leads to DoS using persistent search (CVE-2018-10850) * 389-ds-base: ldapsearch with server side sort allows users to cause a crash (CVE-2018-10935) * 389-ds-base: Server crash through modify command with large DN (CVE-2018-14624) * 389-ds-base: Crash in delete_passwdPolicy when persistent search connections are terminated unexpectedly (CVE-2018-14638) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. The CVE-2018-10850 issue was discovered by Thierry Bordaz (Red Hat) and the CVE-2018-14638 issue was discovered by Viktor Ashirov (Red Hat). Bug Fix(es) : * Previously, the nucn-stans framework was enabled by default in Directory Server, but the framework is not stable. As a consequence, deadlocks and file descriptor leaks could occur. This update changes the default value of the nsslapd-enable-nunc-stans parameter to 'off'. As a result, Directory Server is now stable. (BZ#1614836) * When a search evaluates the 'shadowAccount' entry, Directory Server adds the shadow attributes to the entry. If the fine-grained password policy is enabled, the 'shadowAccount' entry can contain its own 'pwdpolicysubentry' policy attribute. Previously, to retrieve this attribute, the server started an internal search for each 'shadowAccount' entry, which was unnecessary because the entry was already known to the server. With this update, Directory Server only starts internal searches if the entry is not known. As a result, the performance of searches, such as response time and throughput, is improved. (BZ#1615924)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 117766
    published 2018-09-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=117766
    title Oracle Linux 7 : 389-ds-base (ELSA-2018-2757)
  • NASL family Amazon Linux Local Security Checks
    NASL id ALA_ALAS-2018-1094.NASL
    description A vulnerability was discovered in 389-ds-base. The lock controlling the error log was not correctly used when re-opening the log file in log__error_emergency(). An attacker could send a flood of modifications to a very large DN, which would cause slapd to crash.(CVE-2018-14624) A race condition was found in the way 389-ds-base handles persistent search, resulting in a crash if the server is under load. An anonymous attacker could use this flaw to trigger a denial of service.(CVE-2018-10850) A double-free of a password policy structure was found in the way slapd was handling certain errors during persistent search. A unauthenticated attacker could use this flaw to crash Directory Server.(CVE-2018-14638) A flaw was found in the 389 Directory Server that allows users to cause a crash in the LDAP server using ldapsearch with server side sort.(CVE-2018-10935)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 118361
    published 2018-10-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118361
    title Amazon Linux AMI : 389-ds-base (ALAS-2018-1094)
redhat via4
advisories
bugzilla
id 1626079
title CVE-2018-14638 389-ds-base: Crash in delete_passwdPolicy when persistent search connections are terminated unexpectedly
oval
AND
  • OR
    • comment Red Hat Enterprise Linux 7 Client is installed
      oval oval:com.redhat.rhba:tst:20150364001
    • comment Red Hat Enterprise Linux 7 Server is installed
      oval oval:com.redhat.rhba:tst:20150364002
    • comment Red Hat Enterprise Linux 7 Workstation is installed
      oval oval:com.redhat.rhba:tst:20150364003
    • comment Red Hat Enterprise Linux 7 ComputeNode is installed
      oval oval:com.redhat.rhba:tst:20150364004
  • OR
    • AND
      • comment 389-ds-base is earlier than 0:1.3.7.5-28.el7_5
        oval oval:com.redhat.rhsa:tst:20182757005
      • comment 389-ds-base is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhba:tst:20151554010
    • AND
      • comment 389-ds-base-devel is earlier than 0:1.3.7.5-28.el7_5
        oval oval:com.redhat.rhsa:tst:20182757009
      • comment 389-ds-base-devel is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhba:tst:20151554006
    • AND
      • comment 389-ds-base-libs is earlier than 0:1.3.7.5-28.el7_5
        oval oval:com.redhat.rhsa:tst:20182757011
      • comment 389-ds-base-libs is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhba:tst:20151554008
    • AND
      • comment 389-ds-base-snmp is earlier than 0:1.3.7.5-28.el7_5
        oval oval:com.redhat.rhsa:tst:20182757007
      • comment 389-ds-base-snmp is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20162594010
rhsa
id RHSA-2018:2757
released 2018-09-25
severity Moderate
title RHSA-2018:2757: 389-ds-base security and bug fix update (Moderate)
rpms
  • 389-ds-base-0:1.3.7.5-28.el7_5
  • 389-ds-base-devel-0:1.3.7.5-28.el7_5
  • 389-ds-base-libs-0:1.3.7.5-28.el7_5
  • 389-ds-base-snmp-0:1.3.7.5-28.el7_5
refmap via4
confirm
Last major update 14-09-2018 - 15:29
Published 14-09-2018 - 15:29
Last modified 28-11-2018 - 15:43
Back to Top