ID CVE-2018-10850
Summary 389-ds-base before versions 1.4.0.10, 1.3.8.3 is vulnerable to a race condition in the way 389-ds-base handles persistent search, resulting in a crash if the server is under load. An anonymous attacker could use this flaw to trigger a denial of service.
References
Vulnerable Configurations
  • Fedora Project 389 Directory Server 1.1.46
    cpe:2.3:a:fedoraproject:389_directory_server:1.1.46
  • Fedora Project 389 Directory Server 1.2.1
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.1
  • Fedora Project 389 Directory Server 1.2.2
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.2
  • Fedora Project 389 Directory Server 1.2.3
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.3
  • Fedora Project 389 Directory Server 1.2.5
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.5
  • Fedora Project 389 Directory Server 1.2.5 Release Candidate 1
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc1
  • Fedora Project 389 Directory Server 1.2.5 Release Candidate 2
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc2
  • Fedora Project 389 Directory Server 1.2.5 Release Candidate 3
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc3
  • Fedora Project 389 Directory Server 1.2.5 Release Candidate 4
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc4
  • Fedora Project 389 Directory Server 1.2.6
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.6
  • Fedora Project 389 Directory Server 1.2.6 a2
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a2
  • Fedora Project 389 Directory Server 1.2.6 a3
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a3
  • Fedora Project 389 Directory Server 1.2.6 a4
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a4
  • Fedora Project 389 Directory Server 1.2.6 Release Candidate 1
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc1
  • Fedora Project 389 Directory Server 1.2.6 Release Candidate 2
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc2
  • Fedora Project 389 Directory Server 1.2.6 Release Candidate 3
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc3
  • Fedora Project 389 Directory Server 1.2.6 Release Candidate 6
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc6
  • Fedora Project 389 Directory Server 1.2.6 Release Candidate 7
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc7
  • Fedora Project 389 Directory Server 1.2.6.1
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.6.1
  • Fedora Project 389 Directory Server 1.2.7 Alpha 3
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.7:alpha3
  • Fedora Project 389 Directory Server 1.2.7.5
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.7.5
  • Fedora Project 389 Directory Server 1.2.8 Alpha 1
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha1
  • Fedora Project 389 Directory Server 1.2.8 Alpha 2
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha2
  • Fedora Project 389 Directory Server 1.2.8 Alpha 3
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha3
  • Fedora Project 389 Directory Server 1.2.8 Release Candidate 1
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:rc1
  • Fedora Project 389 Directory Server 1.2.8 Release Candidate 2
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:rc2
  • Fedora Project 389 Directory Server 1.2.8.1
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.1
  • Fedora Project 389 Directory Server 1.2.8.2
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.2
  • Fedora Project 389 Directory Server 1.2.8.3
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.3
  • Fedora Project 389 Directory Server 1.2.9.9
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.9.9
  • Fedora Project 389 Directory Server 1.2.10
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.10
  • Fedora Project 389 Directory Server 1.2.10 alpha8
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:alpha8
  • Fedora Project 389 Directory Server 1.2.10 release candidate 1
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:rc1
  • Fedora Project 389 Directory Server 1.2.10.2
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.2
  • Fedora Project 389 Directory Server 1.2.10.3
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.3
  • Fedora Project 389 Directory Server 1.2.10.4
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.4
  • Fedora Project 389 Directory Server 1.2.10.11
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.11
  • Fedora Project 389 Directory Server 1.2.11.1
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.1
  • Fedora Project 389 Directory Server 1.2.11.5
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.5
  • Fedora Project 389 Directory Server 1.2.11.6
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.6
  • Fedora Project 389 Directory Server 1.2.11.8
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.8
  • Fedora Project 389 Directory Server 1.2.11.9
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.9
  • Fedora Project 389 Directory Server 1.2.11.10
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.10
  • Fedora Project 389 Directory Server 1.2.11.11
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.11
  • Fedora Project 389 Directory Server 1.2.11.12
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.12
  • Fedora Project 389 Directory Server 1.2.11.13
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.13
  • Fedora Project 389 Directory Server 1.2.11.14
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.14
  • Fedora Project 389 Directory Server 1.2.11.15
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.15
  • Fedora Project 389 Directory Server 1.2.11.17
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.17
  • Fedora Project 389 Directory Server 1.2.11.19
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.19
  • Fedora Project 389 Directory Server 1.2.11.20
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.20
  • Fedora Project 389 Directory Server 1.2.11.21
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.21
  • Fedora Project 389 Directory Server 1.2.11.22
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.22
  • Fedora Project 389 Directory Server 1.2.11.23
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.23
  • Fedora Project 389 Directory Server 1.2.11.25
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.25
  • Fedora Project 389 Directory Server 1.2.11.26
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.26
  • Fedora Project 389 Directory Server 1.2.16
    cpe:2.3:a:fedoraproject:389_directory_server:1.2.16
  • Fedora Project 389 Directory Server 1.3.0.2
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.2
  • Fedora Project 389 Directory Server 1.3.0.3
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.3
  • Fedora Project 389 Directory Server 1.3.0.4
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.4
  • Fedora Project 389 Directory Server 1.3.0.5
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.5
  • Fedora Project 389 Directory Server 1.3.0.6
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.6
  • Fedora Project 389 Directory Server 1.3.0.7
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.7
  • Fedora Project 389 Directory Server 1.3.0.8
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.8
  • Fedora Project 389 Directory Server 1.3.1.0
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.0
  • Fedora Project 389 Directory Server 1.3.1.1
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.1
  • Fedora Project 389 Directory Server 1.3.1.2
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.2
  • Fedora Project 389 Directory Server 1.3.1.3
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.3
  • Fedora Project 389 Directory Server 1.3.1.4
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.4
  • Fedora Project 389 Directory Server 1.3.1.5
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.5
  • Fedora Project 389 Directory Server 1.3.1.6
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.6
  • Fedora Project 389 Directory Server 1.3.1.7
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.7
  • Fedora Project 389 Directory Server 1.3.1.8
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.8
  • Fedora Project 389 Directory Server 1.3.1.9
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.9
  • Fedora Project 389 Directory Server 1.3.1.10
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.10
  • Fedora Project 389 Directory Server 1.3.1.11
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.11
  • Fedora Project 389 Directory Server 1.3.1.12
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.12
  • Fedora Project 389 Directory Server 1.3.1.13
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.13
  • Fedora Project 389 Directory Server 1.3.1.14
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.14
  • Fedora Project 389 Directory Server 1.3.1.15
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.15
  • Fedora Project 389 Directory Server 1.3.1.16
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.16
  • Fedora Project 389 Directory Server 1.3.1.17
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.17
  • Fedora Project 389 Directory Server 1.3.1.18
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.18
  • Fedora Project 389 Directory Server 1.3.1.19
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.19
  • Fedora Project 389 Directory Server 1.3.1.22
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.1.22
  • Fedora Project 389 Directory Server 1.3.2.2
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.2
  • Fedora Project 389 Directory Server 1.3.2.3
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.3
  • Fedora Project 389 Directory Server 1.3.2.4
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.4
  • Fedora Project 389 Directory Server 1.3.2.5
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.5
  • Fedora Project 389 Directory Server 1.3.2.6
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.6
  • Fedora Project 389 Directory Server 1.3.2.7
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.7
  • Fedora Project 389 Directory Server 1.3.2.8
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.8
  • Fedora Project 389 Directory Server 1.3.2.9
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.9
  • Fedora Project 389 Directory Server 1.3.2.10
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.10
  • Fedora Project 389 Directory Server 1.3.2.11
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.11
  • Fedora Project 389 Directory Server 1.3.2.13
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.13
  • Fedora Project 389 Directory Server 1.3.2.16
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.16
  • Fedora Project 389 Directory Server 1.3.2.19
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.19
  • Fedora Project 389 Directory Server 1.3.2.22
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.22
  • Fedora Project 389 Directory Server 1.3.2.23
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.23
  • Fedora Project 389 Directory Server 1.3.2.24
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.24
  • Fedora Project 389 Directory Server 1.3.2.26
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.26
  • Fedora Project 389 Directory Server 1.3.2.27
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.2.27
  • Fedora Project 389 Directory Server 1.3.3.0
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.3.0
  • Fedora Project 389 Directory Server 1.3.3.2
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.3.2
  • Fedora Project 389 Directory Server 1.3.3.3
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.3.3
  • Fedora Project 389 Directory Server 1.3.3.5
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.3.5
  • Fedora Project 389 Directory Server 1.3.3.8
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.3.8
  • Fedora Project 389 Directory Server 1.3.3.9
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.3.9
  • Fedora Project 389 Directory Server 1.3.3.10
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.3.10
  • Fedora Project 389 Directory Server 1.3.3.11
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.3.11
  • Fedora Project 389 Directory Server 1.3.3.12
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.3.12
  • Fedora Project 389 Directory Server 1.3.3.13
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.3.13
  • Fedora Project 389 Directory Server 1.3.3.14
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.3.14
  • Fedora Project 389 Directory Server 1.3.4.0
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.4.0
  • Fedora Project 389 Directory Server 1.3.4.1
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.4.1
  • Fedora Project 389 Directory Server 1.3.4.4
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.4.4
  • Fedora Project 389 Directory Server 1.3.4.5
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.4.5
  • Fedora Project 389 Directory Server 1.3.4.8
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.4.8
  • Fedora Project 389 Directory Server 1.3.4.9
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.4.9
  • Fedora Project 389 Directory Server 1.3.4.14
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.4.14
  • Fedora Project 389 Directory Server 1.3.5.2
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.5.2
  • Fedora Project 389 Directory Server 1.3.5.3
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.5.3
  • Fedora Project 389 Directory Server 1.3.5.4
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.5.4
  • Fedora Project 389 Directory Server 1.3.5.13
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.5.13
  • Fedora Project 389 Directory Server 1.3.5.14
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.5.14
  • Fedora Project 389 Directory Server 1.3.5.15
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.5.15
  • Fedora Project 389 Directory Server 1.3.5.16
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.5.16
  • Fedora Project 389 Directory Server 1.3.5.17
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.5.17
  • Fedora Project 389 Directory Server 1.3.5.18
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.5.18
  • Fedora Project 389 Directory Server 1.3.5.19
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.5.19
  • Fedora Project 389 Directory Server 1.3.6
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6
  • Fedora Project 389 Directory Server 1.3.6.0
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.0
  • Fedora Project 389 Directory Server 1.3.6.1
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.1
  • Fedora Project 389 Directory Server 1.3.6.2
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.2
  • Fedora Project 389 Directory Server 1.3.6.3
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.3
  • Fedora Project 389 Directory Server 1.3.6.4
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.4
  • Fedora Project 389 Directory Server 1.3.6.5
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.5
  • Fedora Project 389 Directory Server 1.3.6.6
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.6
  • Fedora Project 389 Directory Server 1.3.6.7
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.7
  • Fedora Project 389 Directory Server 1.3.6.8
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.8
  • Fedora Project 389 Directory Server 1.3.6.9
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.9
  • Fedora Project 389 Directory Server 1.3.6.10
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.10
  • Fedora Project 389 Directory Server 1.3.6.11
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.11
  • Fedora Project 389 Directory Server 1.3.6.12
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.12
  • Fedora Project 389 Directory Server 1.3.6.13
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.13
  • Fedora Project 389 Directory Server 1.3.6.14
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.14
  • Fedora Project 389 Directory Server 1.3.6.15
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.6.15
  • Fedora Project 389 Directory Server 1.3.7.1
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.7.1
  • Fedora Project 389 Directory Server 1.3.7.2
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.7.2
  • Fedora Project 389 Directory Server 1.3.7.3
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.7.3
  • Fedora Project 389 Directory Server 1.3.7.4
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.7.4
  • Fedora Project 389 Directory Server 1.3.7.5
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.7.5
  • Fedora Project 389 Directory Server 1.3.7.6
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.7.6
  • Fedora Project 389 Directory Server 1.3.7.7
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.7.7
  • Fedora Project 389 Directory Server 1.3.7.8
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.7.8
  • Fedora Project 389 Directory Server 1.3.7.9
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.7.9
  • Fedora Project 389 Directory Server 1.3.7.10
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.7.10
  • Fedora Project 389 Directory Server 1.3.8.0
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.8.0
  • Fedora Project 389 Directory Server 1.3.8.1
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.8.1
  • Fedora Project 389 Directory Server 1.3.8.2
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.8.2
  • Fedora Project 389 Directory Server 1.3.8.3
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.8.3
  • Fedora Project 389 Directory Server 1.3.8.4
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.8.4
  • Fedora Project 389 Directory Server 1.3.8.5
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.8.5
  • Fedora Project 389 Directory Server 1.3.8.6
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.8.6
  • Fedora Project 389 Directory Server 1.3.8.7
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.8.7
  • Fedora Project 389 Directory Server 1.3.8.8
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.8.8
  • Fedora Project 389 Directory Server 1.3.8.9
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.8.9
  • Fedora Project 389 Directory Server 1.3.8.10
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.8.10
  • Fedora Project 389 Directory Server 1.3.9.0
    cpe:2.3:a:fedoraproject:389_directory_server:1.3.9.0
  • Fedora Project 389 Directory Server 1.4.0.0
    cpe:2.3:a:fedoraproject:389_directory_server:1.4.0.0
  • Fedora Project 389 Directory Server 1.4.0.1
    cpe:2.3:a:fedoraproject:389_directory_server:1.4.0.1
  • Fedora Project 389 Directory Server 1.4.0.2
    cpe:2.3:a:fedoraproject:389_directory_server:1.4.0.2
  • Fedora Project 389 Directory Server 1.4.0.3
    cpe:2.3:a:fedoraproject:389_directory_server:1.4.0.3
  • Fedora Project 389 Directory Server 1.4.0.4
    cpe:2.3:a:fedoraproject:389_directory_server:1.4.0.4
  • Fedora Project 389 Directory Server 1.4.0.5
    cpe:2.3:a:fedoraproject:389_directory_server:1.4.0.5
  • Fedora Project 389 Directory Server 1.4.0.6
    cpe:2.3:a:fedoraproject:389_directory_server:1.4.0.6
  • Fedora Project 389 Directory Server 1.4.0.7
    cpe:2.3:a:fedoraproject:389_directory_server:1.4.0.7
  • Fedora Project 389 Directory Server 1.4.0.8
    cpe:2.3:a:fedoraproject:389_directory_server:1.4.0.8
  • Fedora Project 389 Directory Server 1.4.0.9
    cpe:2.3:a:fedoraproject:389_directory_server:1.4.0.9
  • Debian Linux 8.0 (Jessie)
    cpe:2.3:o:debian:debian_linux:8.0
  • Red Hat Enterprise Linux (RHEL) 7.0 (7)
    cpe:2.3:o:redhat:enterprise_linux:7.0
  • RedHat Enterprise Linux Desktop 7.0
    cpe:2.3:o:redhat:enterprise_linux_desktop:7.0
  • RedHat Enterprise Linux Server 7.0
    cpe:2.3:o:redhat:enterprise_linux_server:7.0
  • Red Hat Enterprise Linux Server Advanced mission critical Update Support (AUS) 7.6
    cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6
  • Red Hat Enterprise Linux Server Extended Update Support (EUS) 7.5
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5
  • Red Hat Enterprise Linux Server Extended Update Support (EUS) 7.6
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6
  • Red Hat Enterprise Linux Server Telecommunications Update Service (TUS) 7.6
    cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6
  • RedHat Enterprise Linux Workstation 7.0
    cpe:2.3:o:redhat:enterprise_linux_workstation:7.0
CVSS
Base: 7.1
Impact:
Exploitability:
CWE CWE-362
CAPEC
  • Leveraging Race Conditions
    This attack targets a race condition occurring when multiple processes access and manipulate the same resource concurrently and the outcome of the execution depends on the particular order in which the access takes place. The attacker can leverage a race condition by "running the race", modifying the resource and modifying the normal execution flow. For instance a race condition can occur while accessing a file, the attacker can trick the system by replacing the original file with his version and cause the system to read the malicious file.
  • Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
    This attack targets a race condition occurring between the time of check (state) for a resource and the time of use of a resource. The typical example is the file access. The attacker can leverage a file access race condition by "running the race", meaning that he would modify the resource between the first time the target program accesses the file and the time the target program uses the file. During that period of time, the attacker could do something such as replace the file and cause an escalation of privilege.
nessus via4
  • NASL family Amazon Linux Local Security Checks
    NASL id AL2_ALAS-2018-1094.NASL
    description A vulnerability was discovered in 389-ds-base. The lock controlling the error log was not correctly used when re-opening the log file in log__error_emergency(). An attacker could send a flood of modifications to a very large DN, which would cause slapd to crash.(CVE-2018-14624) A race condition was found in the way 389-ds-base handles persistent search, resulting in a crash if the server is under load. An anonymous attacker could use this flaw to trigger a denial of service.(CVE-2018-10850) A double-free of a password policy structure was found in the way slapd was handling certain errors during persistent search. A unauthenticated attacker could use this flaw to crash Directory Server.(CVE-2018-14638) A flaw was found in the 389 Directory Server that allows users to cause a crash in the LDAP server using ldapsearch with server side sort.(CVE-2018-10935)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 118401
    published 2018-10-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118401
    title Amazon Linux 2 : 389-ds-base (ALAS-2018-1094)
  • NASL family Huawei Local Security Checks
    NASL id EULEROS_SA-2018-1365.NASL
    description According to the versions of the 389-ds-base packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - race condition on reference counter leads to DoS using persistent search (CVE-2018-10850) - ldapsearch with server side sort allows users to cause a crash (CVE-2018-10935) - Server crash through modify command with large DN (CVE-2018-14624) - Crash in delete_passwdPolicy when persistent search connections are terminated unexpectedly (CVE-2018-14638) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-13
    plugin id 118759
    published 2018-11-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118759
    title EulerOS 2.0 SP3 : 389-ds-base (EulerOS-SA-2018-1365)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20180925_389_DS_BASE_ON_SL7_X.NASL
    description Security Fix(es) : - 389-ds-base: race condition on reference counter leads to DoS using persistent search (CVE-2018-10850) - 389-ds-base: ldapsearch with server side sort allows users to cause a crash (CVE-2018-10935) - 389-ds-base: Server crash through modify command with large DN (CVE-2018-14624) - 389-ds-base: Crash in delete_passwdPolicy when persistent search connections are terminated unexpectedly (CVE-2018-14638) Bug Fix(es) : - Previously, the nucn-stans framework was enabled by default in Directory Server, but the framework is not stable. As a consequence, deadlocks and file descriptor leaks could occur. This update changes the default value of the nsslapd-enable-nunc-stans parameter to 'off'. As a result, Directory Server is now stable. - When a search evaluates the 'shadowAccount' entry, Directory Server adds the shadow attributes to the entry. If the fine-grained password policy is enabled, the 'shadowAccount' entry can contain its own 'pwdpolicysubentry' policy attribute. Previously, to retrieve this attribute, the server started an internal search for each 'shadowAccount' entry, which was unnecessary because the entry was already known to the server. With this update, Directory Server only starts internal searches if the entry is not known. As a result, the performance of searches, such as response time and throughput, is improved.
    last seen 2019-02-21
    modified 2018-12-27
    plugin id 117785
    published 2018-09-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=117785
    title Scientific Linux Security Update : 389-ds-base on SL7.x x86_64
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DLA-1428.NASL
    description CVE-2015-1854 A flaw was found while doing authorization of modrdn operations. An unauthenticated attacker able to issue an ldapmodrdn call to the directory server could perform unauthorized modifications of entries in the directory server. CVE-2017-15134 Improper handling of a search filter in slapi_filter_sprintf() in slapd/util.c can lead to remote server crash and denial of service. CVE-2018-1054 When read access on is enabled, a flaw in SetUnicodeStringFromUTF_8 function in collate.c, can lead to out-of-bounds memory operations. This might result in a server crash, caused by unauthorized users. CVE-2018-1089 Any user (anonymous or authenticated) can crash ns-slapd with a crafted ldapsearch query with very long filter value. CVE-2018-10850 Due to a race condition the server could crash in turbo mode (because of high traffic) or when a worker reads several requests in the read buffer (more_data). Thus an anonymous attacker could trigger a denial of service. For Debian 8 'Jessie', these problems have been fixed in version 1.3.3.5-4+deb8u1. We recommend that you upgrade your 389-ds-base packages. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-08-08
    plugin id 111086
    published 2018-07-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=111086
    title Debian DLA-1428-1 : 389-ds-base security update
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2018-2757.NASL
    description An update for 389-ds-base is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es) : * 389-ds-base: race condition on reference counter leads to DoS using persistent search (CVE-2018-10850) * 389-ds-base: ldapsearch with server side sort allows users to cause a crash (CVE-2018-10935) * 389-ds-base: Server crash through modify command with large DN (CVE-2018-14624) * 389-ds-base: Crash in delete_passwdPolicy when persistent search connections are terminated unexpectedly (CVE-2018-14638) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. The CVE-2018-10850 issue was discovered by Thierry Bordaz (Red Hat) and the CVE-2018-14638 issue was discovered by Viktor Ashirov (Red Hat). Bug Fix(es) : * Previously, the nucn-stans framework was enabled by default in Directory Server, but the framework is not stable. As a consequence, deadlocks and file descriptor leaks could occur. This update changes the default value of the nsslapd-enable-nunc-stans parameter to 'off'. As a result, Directory Server is now stable. (BZ#1614836) * When a search evaluates the 'shadowAccount' entry, Directory Server adds the shadow attributes to the entry. If the fine-grained password policy is enabled, the 'shadowAccount' entry can contain its own 'pwdpolicysubentry' policy attribute. Previously, to retrieve this attribute, the server started an internal search for each 'shadowAccount' entry, which was unnecessary because the entry was already known to the server. With this update, Directory Server only starts internal searches if the entry is not known. As a result, the performance of searches, such as response time and throughput, is improved. (BZ#1615924)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 117830
    published 2018-10-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=117830
    title CentOS 7 : 389-ds-base (CESA-2018:2757)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2018-2757.NASL
    description An update for 389-ds-base is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es) : * 389-ds-base: race condition on reference counter leads to DoS using persistent search (CVE-2018-10850) * 389-ds-base: ldapsearch with server side sort allows users to cause a crash (CVE-2018-10935) * 389-ds-base: Server crash through modify command with large DN (CVE-2018-14624) * 389-ds-base: Crash in delete_passwdPolicy when persistent search connections are terminated unexpectedly (CVE-2018-14638) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. The CVE-2018-10850 issue was discovered by Thierry Bordaz (Red Hat) and the CVE-2018-14638 issue was discovered by Viktor Ashirov (Red Hat). Bug Fix(es) : * Previously, the nucn-stans framework was enabled by default in Directory Server, but the framework is not stable. As a consequence, deadlocks and file descriptor leaks could occur. This update changes the default value of the nsslapd-enable-nunc-stans parameter to 'off'. As a result, Directory Server is now stable. (BZ#1614836) * When a search evaluates the 'shadowAccount' entry, Directory Server adds the shadow attributes to the entry. If the fine-grained password policy is enabled, the 'shadowAccount' entry can contain its own 'pwdpolicysubentry' policy attribute. Previously, to retrieve this attribute, the server started an internal search for each 'shadowAccount' entry, which was unnecessary because the entry was already known to the server. With this update, Directory Server only starts internal searches if the entry is not known. As a result, the performance of searches, such as response time and throughput, is improved. (BZ#1615924)
    last seen 2019-02-21
    modified 2018-11-26
    plugin id 117774
    published 2018-09-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=117774
    title RHEL 7 : 389-ds-base (RHSA-2018:2757)
  • NASL family Huawei Local Security Checks
    NASL id EULEROS_SA-2018-1357.NASL
    description According to the versions of the 389-ds-base packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - race condition on reference counter leads to DoS using persistent search (CVE-2018-10850) - Server crash through modify command with large DN (CVE-2018-14624) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-13
    plugin id 118740
    published 2018-11-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118740
    title EulerOS 2.0 SP2 : 389-ds-base (EulerOS-SA-2018-1357)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2018-2757.NASL
    description From Red Hat Security Advisory 2018:2757 : An update for 389-ds-base is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es) : * 389-ds-base: race condition on reference counter leads to DoS using persistent search (CVE-2018-10850) * 389-ds-base: ldapsearch with server side sort allows users to cause a crash (CVE-2018-10935) * 389-ds-base: Server crash through modify command with large DN (CVE-2018-14624) * 389-ds-base: Crash in delete_passwdPolicy when persistent search connections are terminated unexpectedly (CVE-2018-14638) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. The CVE-2018-10850 issue was discovered by Thierry Bordaz (Red Hat) and the CVE-2018-14638 issue was discovered by Viktor Ashirov (Red Hat). Bug Fix(es) : * Previously, the nucn-stans framework was enabled by default in Directory Server, but the framework is not stable. As a consequence, deadlocks and file descriptor leaks could occur. This update changes the default value of the nsslapd-enable-nunc-stans parameter to 'off'. As a result, Directory Server is now stable. (BZ#1614836) * When a search evaluates the 'shadowAccount' entry, Directory Server adds the shadow attributes to the entry. If the fine-grained password policy is enabled, the 'shadowAccount' entry can contain its own 'pwdpolicysubentry' policy attribute. Previously, to retrieve this attribute, the server started an internal search for each 'shadowAccount' entry, which was unnecessary because the entry was already known to the server. With this update, Directory Server only starts internal searches if the entry is not known. As a result, the performance of searches, such as response time and throughput, is improved. (BZ#1615924)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 117766
    published 2018-09-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=117766
    title Oracle Linux 7 : 389-ds-base (ELSA-2018-2757)
  • NASL family Amazon Linux Local Security Checks
    NASL id ALA_ALAS-2018-1094.NASL
    description A vulnerability was discovered in 389-ds-base. The lock controlling the error log was not correctly used when re-opening the log file in log__error_emergency(). An attacker could send a flood of modifications to a very large DN, which would cause slapd to crash.(CVE-2018-14624) A race condition was found in the way 389-ds-base handles persistent search, resulting in a crash if the server is under load. An anonymous attacker could use this flaw to trigger a denial of service.(CVE-2018-10850) A double-free of a password policy structure was found in the way slapd was handling certain errors during persistent search. A unauthenticated attacker could use this flaw to crash Directory Server.(CVE-2018-14638) A flaw was found in the 389 Directory Server that allows users to cause a crash in the LDAP server using ldapsearch with server side sort.(CVE-2018-10935)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 118361
    published 2018-10-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118361
    title Amazon Linux AMI : 389-ds-base (ALAS-2018-1094)
redhat via4
advisories
rhsa
id RHSA-2018:2757
rpms
  • 389-ds-base-0:1.3.7.5-28.el7_5
  • 389-ds-base-devel-0:1.3.7.5-28.el7_5
  • 389-ds-base-libs-0:1.3.7.5-28.el7_5
  • 389-ds-base-snmp-0:1.3.7.5-28.el7_5
refmap via4
confirm
mlist [debian-lts-announce] 20180715 [SECURITY] [DLA 1428-1] 389-ds-base security update
Last major update 13-06-2018 - 16:29
Published 13-06-2018 - 16:29
Last modified 16-04-2019 - 16:56
Back to Top