All the vulnerabilites related to redhat - directory_server
cve-2024-6237
Vulnerability from cvelistv5
Published
2024-07-09 16:39
Modified
2024-11-24 18:12
Severity ?
EPSS score ?
Summary
A flaw was found in the 389 Directory Server. This flaw allows an unauthenticated user to cause a systematic server crash while sending a specific extended search request, leading to a denial of service.
References
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2024:4997 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2024:5192 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/security/cve/CVE-2024-6237 | vdb-entry, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=2293579 | issue-tracking, x_refsource_REDHAT | |
https://github.com/389ds/389-ds-base/issues/5989 |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ |
Version: 0 ≤ |
||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-6237", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-13T20:16:20.543543Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-13T20:16:27.843Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:33:05.243Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vdb-entry", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2024-6237" }, { "name": "RHBZ#2293579", "tags": [ "issue-tracking", "x_refsource_REDHAT", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293579" }, { "tags": [ "x_transferred" ], "url": "https://github.com/389ds/389-ds-base/issues/5989" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://github.com/389ds/389-ds-base", "defaultStatus": "unaffected", "packageName": "389-ds-base", "versions": [ { "lessThan": "2.4.5", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:directory_server:12.4::el9" ], "defaultStatus": "affected", "packageName": "redhat-ds:12", "product": "Red Hat Directory Server 12.4 for RHEL 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "9040020240723122852.1674d574", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ], "defaultStatus": "affected", "packageName": "389-ds-base", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:2.4.5-9.el9_4", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:directory_server:11" ], "defaultStatus": "unaffected", "packageName": "redhat-ds:11/389-ds-base", "product": "Red Hat Directory Server 11", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:6" ], "defaultStatus": "unaffected", "packageName": "389-ds-base", "product": "Red Hat Enterprise Linux 6", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:7" ], "defaultStatus": "unaffected", "packageName": "389-ds-base", "product": "Red Hat Enterprise Linux 7", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:8" ], "defaultStatus": "unaffected", "packageName": "389-ds:1.4/389-ds-base", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat" } ], "datePublic": "2024-07-09T16:03:00+00:00", "descriptions": [ { "lang": "en", "value": "A flaw was found in the 389 Directory Server. This flaw allows an unauthenticated user to cause a systematic server crash while sending a specific extended search request, leading to a denial of service." } ], "metrics": [ { "other": { "content": { "namespace": "https://access.redhat.com/security/updates/classification/", "value": "Moderate" }, "type": "Red Hat severity rating" } }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-230", "description": "Improper Handling of Missing Values", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-24T18:12:28.233Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2024:4997", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:4997" }, { "name": "RHSA-2024:5192", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:5192" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/cve/CVE-2024-6237" }, { "name": "RHBZ#2293579", "tags": [ "issue-tracking", "x_refsource_REDHAT" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293579" }, { "url": "https://github.com/389ds/389-ds-base/issues/5989" } ], "timeline": [ { "lang": "en", "time": "2024-06-20T00:00:00+00:00", "value": "Reported to Red Hat." }, { "lang": "en", "time": "2024-07-09T16:03:00+00:00", "value": "Made public." } ], "title": "389-ds-base: unauthenticated user can trigger a dos by sending a specific extended search request", "workarounds": [ { "lang": "en", "value": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability." } ], "x_redhatCweChain": "CWE-230: Improper Handling of Missing Values" } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2024-6237", "datePublished": "2024-07-09T16:39:58.810Z", "dateReserved": "2024-06-21T02:32:34.022Z", "dateUpdated": "2024-11-24T18:12:28.233Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1949
Vulnerability from cvelistv5
Published
2022-06-01 15:08
Modified
2024-08-03 00:24
Severity ?
EPSS score ?
Summary
An access control bypass vulnerability found in 389-ds-base. That mishandling of the filter that would yield incorrect results, but as that has progressed, can be determined that it actually is an access control bypass. This may allow any remote unauthenticated user to issue a filter that allows searching for database items they do not have access to, including but not limited to potentially userPassword hashes and other sensitive data.
References
▼ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2091781 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | 389-ds-base |
Version: 389-ds-base-2.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:24:42.623Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091781" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "389-ds-base", "vendor": "n/a", "versions": [ { "status": "affected", "version": "389-ds-base-2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "An access control bypass vulnerability found in 389-ds-base. That mishandling of the filter that would yield incorrect results, but as that has progressed, can be determined that it actually is an access control bypass. This may allow any remote unauthenticated user to issue a filter that allows searching for database items they do not have access to, including but not limited to potentially userPassword hashes and other sensitive data." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-01T15:08:52", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091781" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2022-1949", "datePublished": "2022-06-01T15:08:52", "dateReserved": "2022-05-31T00:00:00", "dateUpdated": "2024-08-03T00:24:42.623Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-0890
Vulnerability from cvelistv5
Published
2008-03-12 00:00
Modified
2024-08-07 08:01
Severity ?
EPSS score ?
Summary
Red Hat Directory Server 7.1 before SP4 uses insecure permissions for certain directories, which allows local users to modify JAR files and execute arbitrary code via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/29350 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41152 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/28204 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1019577 | vdb-entry, x_refsource_SECTRACK | |
http://www.redhat.com/support/errata/RHSA-2008-0173.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:01:40.081Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "29350", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29350" }, { "name": "rhds-jars-insecure-permissions(41152)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41152" }, { "name": "28204", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28204" }, { "name": "1019577", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019577" }, { "name": "RHSA-2008:0173", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0173.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Red Hat Directory Server 7.1 before SP4 uses insecure permissions for certain directories, which allows local users to modify JAR files and execute arbitrary code via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "29350", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29350" }, { "name": "rhds-jars-insecure-permissions(41152)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41152" }, { "name": "28204", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28204" }, { "name": "1019577", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019577" }, { "name": "RHSA-2008:0173", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0173.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2008-0890", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Red Hat Directory Server 7.1 before SP4 uses insecure permissions for certain directories, which allows local users to modify JAR files and execute arbitrary code via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "29350", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29350" }, { "name": "rhds-jars-insecure-permissions(41152)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41152" }, { "name": "28204", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28204" }, { "name": "1019577", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019577" }, { "name": "RHSA-2008:0173", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0173.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-0890", "datePublished": "2008-03-12T00:00:00", "dateReserved": "2008-02-21T00:00:00", "dateUpdated": "2024-08-07T08:01:40.081Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-2929
Vulnerability from cvelistv5
Published
2008-08-29 18:00
Modified
2024-08-07 09:21
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the adminutil library in the Directory Server Administration Express and Directory Server Gateway (DSGW) web interface in Red Hat Directory Server 7.1 before SP7 and 8 EL4 and EL5, and Fedora Directory Server, allow remote attackers to inject arbitrary web script or HTML via input values that use % (percent) escaping.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:21:34.992Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "31612", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31612" }, { "name": "SSRT080113", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html" }, { "name": "31702", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31702" }, { "name": "RHSA-2008:0601", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2008-0601.html" }, { "name": "RHSA-2008:0596", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2008-0596.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454621" }, { "name": "HPSBUX02354", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "name": "rhds-dsgw-dsae-xss(44737)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44737" }, { "name": "ADV-2008-2480", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2480" }, { "name": "FEDORA-2008-7642", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00218.html" }, { "name": "FEDORA-2008-7339", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00449.html" }, { "name": "30870", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/30870" }, { "name": "31777", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31777" }, { "name": "31565", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31565" }, { "name": "1020772", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1020772" }, { "name": "oval:org.mitre.oval:def:5877", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5877" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-08-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the adminutil library in the Directory Server Administration Express and Directory Server Gateway (DSGW) web interface in Red Hat Directory Server 7.1 before SP7 and 8 EL4 and EL5, and Fedora Directory Server, allow remote attackers to inject arbitrary web script or HTML via input values that use % (percent) escaping." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "31612", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31612" }, { "name": "SSRT080113", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html" }, { "name": "31702", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31702" }, { "name": "RHSA-2008:0601", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2008-0601.html" }, { "name": "RHSA-2008:0596", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2008-0596.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454621" }, { "name": "HPSBUX02354", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "name": "rhds-dsgw-dsae-xss(44737)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44737" }, { "name": "ADV-2008-2480", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2480" }, { "name": "FEDORA-2008-7642", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00218.html" }, { "name": "FEDORA-2008-7339", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00449.html" }, { "name": "30870", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/30870" }, { "name": "31777", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31777" }, { "name": "31565", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31565" }, { "name": "1020772", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1020772" }, { "name": "oval:org.mitre.oval:def:5877", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5877" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2008-2929", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the adminutil library in the Directory Server Administration Express and Directory Server Gateway (DSGW) web interface in Red Hat Directory Server 7.1 before SP7 and 8 EL4 and EL5, and Fedora Directory Server, allow remote attackers to inject arbitrary web script or HTML via input values that use % (percent) escaping." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "31612", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31612" }, { "name": "SSRT080113", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "name": "http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html", "refsource": "CONFIRM", "url": "http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html" }, { "name": "31702", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31702" }, { "name": "RHSA-2008:0601", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2008-0601.html" }, { "name": "RHSA-2008:0596", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2008-0596.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=454621", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454621" }, { "name": "HPSBUX02354", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "name": "rhds-dsgw-dsae-xss(44737)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44737" }, { "name": "ADV-2008-2480", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2480" }, { "name": "FEDORA-2008-7642", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00218.html" }, { "name": "FEDORA-2008-7339", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00449.html" }, { "name": "30870", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30870" }, { "name": "31777", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31777" }, { "name": "31565", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31565" }, { "name": "1020772", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1020772" }, { "name": "oval:org.mitre.oval:def:5877", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5877" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-2929", "datePublished": "2008-08-29T18:00:00", "dateReserved": "2008-06-30T00:00:00", "dateUpdated": "2024-08-07T09:21:34.992Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3282
Vulnerability from cvelistv5
Published
2020-01-09 20:52
Modified
2024-08-07 03:03
Severity ?
EPSS score ?
Summary
389 Directory Server before 1.2.7.1 (aka Red Hat Directory Server 8.2) and HP-UX Directory Server before B.08.10.03, when audit logging is enabled, logs the Directory Manager password (nsslapd-rootpw) in cleartext when changing cn=config:nsslapd-rootpw, which might allow local users to obtain sensitive information by reading the log.
References
▼ | URL | Tags |
---|---|---|
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6914 | vdb-entry, signature, x_refsource_OVAL | |
https://bugzilla.redhat.com/show_bug.cgi?id=625950 | x_refsource_CONFIRM | |
https://git.fedorahosted.org/cgit/389/ds.git/commit/?id=d38ae06 | x_refsource_CONFIRM | |
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c02522633&docLocale=en_US | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Red Hat | 389 Directory Server |
Version: before 1.2.7.1 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:03:18.937Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:6914", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6914" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=625950" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.fedorahosted.org/cgit/389/ds.git/commit/?id=d38ae06" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c02522633\u0026docLocale=en_US" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "389 Directory Server", "vendor": "Red Hat", "versions": [ { "status": "affected", "version": "before 1.2.7.1" } ] }, { "product": "HP-UX Directory Server", "vendor": "HP", "versions": [ { "status": "affected", "version": "before B.08.10.03" } ] } ], "datePublic": "2010-09-22T00:00:00", "descriptions": [ { "lang": "en", "value": "389 Directory Server before 1.2.7.1 (aka Red Hat Directory Server 8.2) and HP-UX Directory Server before B.08.10.03, when audit logging is enabled, logs the Directory Manager password (nsslapd-rootpw) in cleartext when changing cn=config:nsslapd-rootpw, which might allow local users to obtain sensitive information by reading the log." } ], "problemTypes": [ { "descriptions": [ { "description": "Path Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-09T20:52:18", "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2", "shortName": "hp" }, "references": [ { "name": "oval:org.mitre.oval:def:6914", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6914" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=625950" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.fedorahosted.org/cgit/389/ds.git/commit/?id=d38ae06" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c02522633\u0026docLocale=en_US" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "hp-security-alert@hp.com", "ID": "CVE-2010-3282", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "389 Directory Server", "version": { "version_data": [ { "version_value": "before 1.2.7.1" } ] } } ] }, "vendor_name": "Red Hat" }, { "product": { "product_data": [ { "product_name": "HP-UX Directory Server", "version": { "version_data": [ { "version_value": "before B.08.10.03" } ] } } ] }, "vendor_name": "HP" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "389 Directory Server before 1.2.7.1 (aka Red Hat Directory Server 8.2) and HP-UX Directory Server before B.08.10.03, when audit logging is enabled, logs the Directory Manager password (nsslapd-rootpw) in cleartext when changing cn=config:nsslapd-rootpw, which might allow local users to obtain sensitive information by reading the log." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Path Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:6914", "refsource": "OVAL", "url": "http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6914" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=625950", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=625950" }, { "name": "https://git.fedorahosted.org/cgit/389/ds.git/commit/?id=d38ae06", "refsource": "CONFIRM", "url": "https://git.fedorahosted.org/cgit/389/ds.git/commit/?id=d38ae06" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c02522633\u0026docLocale=en_US", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c02522633\u0026docLocale=en_US" } ] } } } }, "cveMetadata": { "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2", "assignerShortName": "hp", "cveId": "CVE-2010-3282", "datePublished": "2020-01-09T20:52:18", "dateReserved": "2010-09-13T00:00:00", "dateUpdated": "2024-08-07T03:03:18.937Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-2219
Vulnerability from cvelistv5
Published
2013-07-31 10:00
Modified
2024-08-06 15:27
Severity ?
EPSS score ?
Summary
The Red Hat Directory Server before 8.2.11-13 and 389 Directory Server do not properly restrict access to entity attributes, which allows remote authenticated users to obtain sensitive information via a search query for the attribute.
References
▼ | URL | Tags |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2013-1119.html | vendor-advisory, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=979508 | x_refsource_CONFIRM | |
http://rhn.redhat.com/errata/RHSA-2013-1116.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:27:41.088Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2013:1119", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1119.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=979508" }, { "name": "RHSA-2013:1116", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1116.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-29T00:00:00", "descriptions": [ { "lang": "en", "value": "The Red Hat Directory Server before 8.2.11-13 and 389 Directory Server do not properly restrict access to entity attributes, which allows remote authenticated users to obtain sensitive information via a search query for the attribute." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-17T21:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2013:1119", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1119.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=979508" }, { "name": "RHSA-2013:1116", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1116.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-2219", "datePublished": "2013-07-31T10:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:27:41.088Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-2746
Vulnerability from cvelistv5
Published
2012-07-03 16:00
Modified
2024-08-06 19:42
Severity ?
EPSS score ?
Summary
389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), when the password of a LDAP user has been changed and audit logging is enabled, saves the new password to the log in plain text, which allows remote authenticated users to read the password.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:42:32.430Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "83329", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/83329" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://fedorahosted.org/389/ticket/365" }, { "name": "49734", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49734" }, { "name": "389directory-logging-info-disclosure(76595)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76595" }, { "name": "SSRT101189", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083" }, { "name": "54153", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/54153" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://directory.fedoraproject.org/wiki/Release_Notes" }, { "name": "HPSBUX02881", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083" }, { "name": "RHSA-2012:1041", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1041.html" }, { "name": "RHSA-2012:0997", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0997.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833482" }, { "name": "oval:org.mitre.oval:def:19241", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19241" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-06-26T00:00:00", "descriptions": [ { "lang": "en", "value": "389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), when the password of a LDAP user has been changed and audit logging is enabled, saves the new password to the log in plain text, which allows remote authenticated users to read the password." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "83329", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/83329" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://fedorahosted.org/389/ticket/365" }, { "name": "49734", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49734" }, { "name": "389directory-logging-info-disclosure(76595)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76595" }, { "name": "SSRT101189", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083" }, { "name": "54153", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/54153" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://directory.fedoraproject.org/wiki/Release_Notes" }, { "name": "HPSBUX02881", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083" }, { "name": "RHSA-2012:1041", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1041.html" }, { "name": "RHSA-2012:0997", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0997.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833482" }, { "name": "oval:org.mitre.oval:def:19241", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19241" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-2746", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), when the password of a LDAP user has been changed and audit logging is enabled, saves the new password to the log in plain text, which allows remote authenticated users to read the password." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "83329", "refsource": "OSVDB", "url": "http://www.osvdb.org/83329" }, { "name": "https://fedorahosted.org/389/ticket/365", "refsource": "CONFIRM", "url": "https://fedorahosted.org/389/ticket/365" }, { "name": "49734", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49734" }, { "name": "389directory-logging-info-disclosure(76595)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76595" }, { "name": "SSRT101189", "refsource": "HP", "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083" }, { "name": "54153", "refsource": "BID", "url": "http://www.securityfocus.com/bid/54153" }, { "name": "http://directory.fedoraproject.org/wiki/Release_Notes", "refsource": "CONFIRM", "url": "http://directory.fedoraproject.org/wiki/Release_Notes" }, { "name": "HPSBUX02881", "refsource": "HP", "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083" }, { "name": "RHSA-2012:1041", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-1041.html" }, { "name": "RHSA-2012:0997", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-0997.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=833482", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833482" }, { "name": "oval:org.mitre.oval:def:19241", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19241" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-2746", "datePublished": "2012-07-03T16:00:00", "dateReserved": "2012-05-14T00:00:00", "dateUpdated": "2024-08-06T19:42:32.430Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0532
Vulnerability from cvelistv5
Published
2011-02-23 18:00
Modified
2024-08-06 21:58
Severity ?
EPSS score ?
Summary
The (1) backup and restore scripts, (2) main initialization script, and (3) ldap-agent script in 389 Directory Server 1.2.x (aka Red Hat Directory Server 8.2.x) place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1025102 | vdb-entry, x_refsource_SECTRACK | |
https://bugzilla.redhat.com/show_bug.cgi?id=672468 | x_refsource_CONFIRM | |
http://www.redhat.com/support/errata/RHSA-2011-0293.html | vendor-advisory, x_refsource_REDHAT | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/65637 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/46489 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:58:25.786Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1025102", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025102" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=672468" }, { "name": "RHSA-2011:0293", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0293.html" }, { "name": "rhds-ldlibrarypath-priv-esc(65637)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65637" }, { "name": "46489", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46489" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-22T00:00:00", "descriptions": [ { "lang": "en", "value": "The (1) backup and restore scripts, (2) main initialization script, and (3) ldap-agent script in 389 Directory Server 1.2.x (aka Red Hat Directory Server 8.2.x) place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "1025102", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025102" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=672468" }, { "name": "RHSA-2011:0293", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0293.html" }, { "name": "rhds-ldlibrarypath-priv-esc(65637)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65637" }, { "name": "46489", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46489" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-0532", "datePublished": "2011-02-23T18:00:00", "dateReserved": "2011-01-20T00:00:00", "dateUpdated": "2024-08-06T21:58:25.786Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1055
Vulnerability from cvelistv5
Published
2023-02-27 00:00
Modified
2024-08-02 05:32
Severity ?
EPSS score ?
Summary
A flaw was found in RHDS 11 and RHDS 12. While browsing entries LDAP tries to decode the userPassword attribute instead of the userCertificate attribute which could lead into sensitive information leaked. An attacker with a local account where the cockpit-389-ds is running can list the processes and display the hashed passwords. The highest threat from this vulnerability is to data confidentiality.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Red Hat Directory Server |
Version: 11 and 12 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:32:46.360Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173517#c0" }, { "name": "FEDORA-2023-c92be0dfa0", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZOYQ5TCV6ZEPMDV4CSLK3KINAAO4SRI/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Red Hat Directory Server", "vendor": "n/a", "versions": [ { "status": "affected", "version": "11 and 12" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in RHDS 11 and RHDS 12. While browsing entries LDAP tries to decode the userPassword attribute instead of the userCertificate attribute which could lead into sensitive information leaked. An attacker with a local account where the cockpit-389-ds is running can list the processes and display the hashed passwords. The highest threat from this vulnerability is to data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-26T00:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173517#c0" }, { "name": "FEDORA-2023-c92be0dfa0", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZOYQ5TCV6ZEPMDV4CSLK3KINAAO4SRI/" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2023-1055", "datePublished": "2023-02-27T00:00:00", "dateReserved": "2023-02-27T00:00:00", "dateUpdated": "2024-08-02T05:32:46.360Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-2928
Vulnerability from cvelistv5
Published
2008-08-29 18:00
Modified
2024-08-07 09:21
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in the adminutil library in CGI applications in Red Hat Directory Server 7.1 before SP7 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted Accept-Language HTTP header.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:21:34.490Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453916" }, { "name": "1020771", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1020771" }, { "name": "SSRT080113", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html" }, { "name": "31702", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31702" }, { "name": "RHSA-2008:0596", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2008-0596.html" }, { "name": "HPSBUX02354", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "name": "30869", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/30869" }, { "name": "ADV-2008-2480", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2480" }, { "name": "FEDORA-2008-7642", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00218.html" }, { "name": "FEDORA-2008-7339", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00449.html" }, { "name": "31777", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31777" }, { "name": "oval:org.mitre.oval:def:5865", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5865" }, { "name": "rhds-acceptlanguage-bo(44738)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44738" }, { "name": "31565", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-08-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in the adminutil library in CGI applications in Red Hat Directory Server 7.1 before SP7 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted Accept-Language HTTP header." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453916" }, { "name": "1020771", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1020771" }, { "name": "SSRT080113", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html" }, { "name": "31702", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31702" }, { "name": "RHSA-2008:0596", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2008-0596.html" }, { "name": "HPSBUX02354", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "name": "30869", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/30869" }, { "name": "ADV-2008-2480", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2480" }, { "name": "FEDORA-2008-7642", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00218.html" }, { "name": "FEDORA-2008-7339", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00449.html" }, { "name": "31777", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31777" }, { "name": "oval:org.mitre.oval:def:5865", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5865" }, { "name": "rhds-acceptlanguage-bo(44738)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44738" }, { "name": "31565", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2008-2928", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in the adminutil library in CGI applications in Red Hat Directory Server 7.1 before SP7 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted Accept-Language HTTP header." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=453916", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453916" }, { "name": "1020771", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1020771" }, { "name": "SSRT080113", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "name": "http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html", "refsource": "CONFIRM", "url": "http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html" }, { "name": "31702", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31702" }, { "name": "RHSA-2008:0596", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2008-0596.html" }, { "name": "HPSBUX02354", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "name": "30869", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30869" }, { "name": "ADV-2008-2480", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2480" }, { "name": "FEDORA-2008-7642", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00218.html" }, { "name": "FEDORA-2008-7339", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00449.html" }, { "name": "31777", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31777" }, { "name": "oval:org.mitre.oval:def:5865", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5865" }, { "name": "rhds-acceptlanguage-bo(44738)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44738" }, { "name": "31565", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31565" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-2928", "datePublished": "2008-08-29T18:00:00", "dateReserved": "2008-06-30T00:00:00", "dateUpdated": "2024-08-07T09:21:34.490Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-2850
Vulnerability from cvelistv5
Published
2022-10-14 00:00
Modified
2024-08-03 00:52
Severity ?
EPSS score ?
Summary
A flaw was found In 389-ds-base. When the Content Synchronization plugin is enabled, an authenticated user can reach a NULL pointer dereference using a specially crafted query. This flaw allows an authenticated attacker to cause a denial of service. This CVE is assigned against an incomplete fix of CVE-2021-3514.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | 389-ds-base |
Version: 389-ds-base-2.0.x+ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:52:59.768Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2118691" }, { "tags": [ "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2022-2850" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "389-ds-base", "vendor": "n/a", "versions": [ { "status": "affected", "version": "389-ds-base-2.0.x+" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found In 389-ds-base. When the Content Synchronization plugin is enabled, an authenticated user can reach a NULL pointer dereference using a specially crafted query. This flaw allows an authenticated attacker to cause a denial of service. This CVE is assigned against an incomplete fix of CVE-2021-3514." } ], "problemTypes": [ { "descriptions": [ { "description": "denial of service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2118691" }, { "url": "https://access.redhat.com/security/cve/CVE-2022-2850" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2022-2850", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-08-16T00:00:00", "dateUpdated": "2024-08-03T00:52:59.768Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4485
Vulnerability from cvelistv5
Published
2013-11-23 11:00
Modified
2024-08-06 16:45
Severity ?
EPSS score ?
Summary
389 Directory Server 1.2.11.15 (aka Red Hat Directory Server before 8.2.11-14) allows remote authenticated users to cause a denial of service (crash) via multiple @ characters in a GER attribute list in a search request.
References
▼ | URL | Tags |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2013-1752.html | vendor-advisory, x_refsource_REDHAT | |
http://secunia.com/advisories/55765 | third-party-advisory, x_refsource_SECUNIA | |
http://rhn.redhat.com/errata/RHSA-2013-1753.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:45:14.642Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2013:1752", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1752.html" }, { "name": "55765", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/55765" }, { "name": "RHSA-2013:1753", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1753.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-11-21T00:00:00", "descriptions": [ { "lang": "en", "value": "389 Directory Server 1.2.11.15 (aka Red Hat Directory Server before 8.2.11-14) allows remote authenticated users to cause a denial of service (crash) via multiple @ characters in a GER attribute list in a search request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-11-23T18:10:04", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2013:1752", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1752.html" }, { "name": "55765", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/55765" }, { "name": "RHSA-2013:1753", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1753.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4485", "datePublished": "2013-11-23T11:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:45:14.642Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1677
Vulnerability from cvelistv5
Published
2008-05-12 16:00
Modified
2024-08-07 08:32
Severity ?
EPSS score ?
Summary
Buffer overflow in the regular expression handler in Red Hat Directory Server 8.0 and 7.1 before SP6 allows remote attackers to cause a denial of service (slapd crash) and possibly execute arbitrary code via a crafted LDAP query that triggers the overflow during translation to a regular expression.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/29126 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1020001 | vdb-entry, x_refsource_SECTRACK | |
http://www.redhat.com/support/errata/RHSA-2008-0268.html | vendor-advisory, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=444712 | x_refsource_MISC | |
http://secunia.com/advisories/30185 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/30181 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/42332 | vdb-entry, x_refsource_XF | |
http://www.redhat.com/support/errata/RHSA-2008-0269.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:32:01.281Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "29126", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/29126" }, { "name": "1020001", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020001" }, { "name": "RHSA-2008:0268", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0268.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=444712" }, { "name": "30185", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30185" }, { "name": "30181", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30181" }, { "name": "rhds-fedora-expression-bo(42332)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42332" }, { "name": "RHSA-2008:0269", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0269.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-05-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the regular expression handler in Red Hat Directory Server 8.0 and 7.1 before SP6 allows remote attackers to cause a denial of service (slapd crash) and possibly execute arbitrary code via a crafted LDAP query that triggers the overflow during translation to a regular expression." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "29126", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/29126" }, { "name": "1020001", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020001" }, { "name": "RHSA-2008:0268", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0268.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=444712" }, { "name": "30185", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30185" }, { "name": "30181", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30181" }, { "name": "rhds-fedora-expression-bo(42332)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42332" }, { "name": "RHSA-2008:0269", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0269.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2008-1677", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the regular expression handler in Red Hat Directory Server 8.0 and 7.1 before SP6 allows remote attackers to cause a denial of service (slapd crash) and possibly execute arbitrary code via a crafted LDAP query that triggers the overflow during translation to a regular expression." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "29126", "refsource": "BID", "url": "http://www.securityfocus.com/bid/29126" }, { "name": "1020001", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020001" }, { "name": "RHSA-2008:0268", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0268.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=444712", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=444712" }, { "name": "30185", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30185" }, { "name": "30181", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30181" }, { "name": "rhds-fedora-expression-bo(42332)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42332" }, { "name": "RHSA-2008:0269", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0269.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-1677", "datePublished": "2008-05-12T16:00:00", "dateReserved": "2008-04-03T00:00:00", "dateUpdated": "2024-08-07T08:32:01.281Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-35518
Vulnerability from cvelistv5
Published
2021-03-26 16:43
Modified
2024-08-04 17:02
Severity ?
EPSS score ?
Summary
When binding against a DN during authentication, the reply from 389-ds-base will be different whether the DN exists or not. This can be used by an unauthenticated attacker to check the existence of an entry in the LDAP database.
References
▼ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1905565 | x_refsource_MISC | |
https://github.com/389ds/389-ds-base/issues/4480 | x_refsource_MISC | |
https://github.com/389ds/389-ds-base/commit/cc0f69283abc082488824702dae485b8eae938bc | x_refsource_MISC | |
https://github.com/389ds/389-ds-base/commit/b6aae4d8e7c8a6ddd21646f94fef1bf7f22c3f32 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | 389-ds-base |
Version: 389-ds-base 2.0.3, 389-ds-base 1.4.4.13, 389-ds-base 1.4.3.19 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:02:08.248Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905565" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/389ds/389-ds-base/issues/4480" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/389ds/389-ds-base/commit/cc0f69283abc082488824702dae485b8eae938bc" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/389ds/389-ds-base/commit/b6aae4d8e7c8a6ddd21646f94fef1bf7f22c3f32" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "389-ds-base", "vendor": "n/a", "versions": [ { "status": "affected", "version": "389-ds-base 2.0.3, 389-ds-base 1.4.4.13, 389-ds-base 1.4.3.19" } ] } ], "descriptions": [ { "lang": "en", "value": "When binding against a DN during authentication, the reply from 389-ds-base will be different whether the DN exists or not. This can be used by an unauthenticated attacker to check the existence of an entry in the LDAP database." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-26T16:43:08", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905565" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/389ds/389-ds-base/issues/4480" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/389ds/389-ds-base/commit/cc0f69283abc082488824702dae485b8eae938bc" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/389ds/389-ds-base/commit/b6aae4d8e7c8a6ddd21646f94fef1bf7f22c3f32" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-35518", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "389-ds-base", "version": { "version_data": [ { "version_value": "389-ds-base 2.0.3, 389-ds-base 1.4.4.13, 389-ds-base 1.4.3.19" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When binding against a DN during authentication, the reply from 389-ds-base will be different whether the DN exists or not. This can be used by an unauthenticated attacker to check the existence of an entry in the LDAP database." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1905565", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905565" }, { "name": "https://github.com/389ds/389-ds-base/issues/4480", "refsource": "MISC", "url": "https://github.com/389ds/389-ds-base/issues/4480" }, { "name": "https://github.com/389ds/389-ds-base/commit/cc0f69283abc082488824702dae485b8eae938bc", "refsource": "MISC", "url": "https://github.com/389ds/389-ds-base/commit/cc0f69283abc082488824702dae485b8eae938bc" }, { "name": "https://github.com/389ds/389-ds-base/commit/b6aae4d8e7c8a6ddd21646f94fef1bf7f22c3f32", "refsource": "MISC", "url": "https://github.com/389ds/389-ds-base/commit/b6aae4d8e7c8a6ddd21646f94fef1bf7f22c3f32" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-35518", "datePublished": "2021-03-26T16:43:08", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-04T17:02:08.248Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-1062
Vulnerability from cvelistv5
Published
2024-02-12 13:04
Modified
2024-12-04 14:20
Severity ?
EPSS score ?
Summary
A heap overflow flaw was found in 389-ds-base. This issue leads to a denial of service when writing a value larger than 256 chars in log_entry_attr.
References
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2024:1074 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2024:1372 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2024:3047 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2024:4209 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2024:4633 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2024:5690 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2024:7458 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/security/cve/CVE-2024-1062 | vdb-entry, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=2256711 | ||
https://bugzilla.redhat.com/show_bug.cgi?id=2261879 | issue-tracking, x_refsource_REDHAT |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ |
Version: 1.4.3.0 ≤ |
||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-1062", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-22T18:08:45.921597Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:21:57.500Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T18:26:30.502Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2024:1074", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:1074" }, { "name": "RHSA-2024:1372", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:1372" }, { "name": "RHSA-2024:3047", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:3047" }, { "name": "RHSA-2024:4209", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:4209" }, { "name": "RHSA-2024:4633", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:4633" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2024-1062" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256711" }, { "name": "RHBZ#2261879", "tags": [ "issue-tracking", "x_refsource_REDHAT", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2261879" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://github.com/389ds/389-ds-base/", "defaultStatus": "unaffected", "packageName": "389-ds-base", "versions": [ { "lessThan": "2.2.*", "status": "affected", "version": "1.4.3.0", "versionType": "semver" }, { "lessThan": "*", "status": "unaffected", "version": "2.3.0", "versionType": "semver" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:directory_server:11.7::el8" ], "defaultStatus": "affected", "packageName": "redhat-ds:11", "product": "Red Hat Directory Server 11.7 for RHEL 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "8080020240306153507.f969626e", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:directory_server:11.8::el8" ], "defaultStatus": "affected", "packageName": "redhat-ds:11", "product": "Red Hat Directory Server 11.8 for RHEL 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "8090020240606122459.91529cd0", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:directory_server_eus:12.2::el9" ], "defaultStatus": "affected", "packageName": "redhat-ds:12", "product": "Red Hat Directory Server 12.2 EUS for RHEL 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "9020020240916150035.1674d574", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:8::appstream" ], "defaultStatus": "affected", "packageName": "389-ds:1.4", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "8100020240315011748.945b6f6d", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:8.6::appstream" ], "defaultStatus": "affected", "packageName": "389-ds:1.4", "product": "Red Hat Enterprise Linux 8.6 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "8060020240213164457.824efc52", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:8.8::appstream" ], "defaultStatus": "affected", "packageName": "389-ds:1.4", "product": "Red Hat Enterprise Linux 8.8 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "8080020240807050952.6dbb3803", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:9.2::appstream" ], "defaultStatus": "affected", "packageName": "389-ds-base", "product": "Red Hat Enterprise Linux 9.2 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:2.2.4-9.el9_2", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:directory_server:12" ], "defaultStatus": "affected", "packageName": "redhat-ds:12/389-ds-base", "product": "Red Hat Directory Server 12", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:6" ], "defaultStatus": "unknown", "packageName": "389-ds-base", "product": "Red Hat Enterprise Linux 6", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:7" ], "defaultStatus": "unknown", "packageName": "389-ds-base", "product": "Red Hat Enterprise Linux 7", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:9" ], "defaultStatus": "affected", "packageName": "389-ds-base", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat" } ], "datePublic": "2024-01-30T00:00:00+00:00", "descriptions": [ { "lang": "en", "value": "A heap overflow flaw was found in 389-ds-base. This issue leads to a denial of service when writing a value larger than 256 chars in log_entry_attr." } ], "metrics": [ { "other": { "content": { "namespace": "https://access.redhat.com/security/updates/classification/", "value": "Moderate" }, "type": "Red Hat severity rating" } }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T14:20:42.482Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2024:1074", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:1074" }, { "name": "RHSA-2024:1372", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:1372" }, { "name": "RHSA-2024:3047", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:3047" }, { "name": "RHSA-2024:4209", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:4209" }, { "name": "RHSA-2024:4633", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:4633" }, { "name": "RHSA-2024:5690", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:5690" }, { "name": "RHSA-2024:7458", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:7458" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/cve/CVE-2024-1062" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256711" }, { "name": "RHBZ#2261879", "tags": [ "issue-tracking", "x_refsource_REDHAT" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2261879" } ], "timeline": [ { "lang": "en", "time": "2024-01-30T00:00:00+00:00", "value": "Reported to Red Hat." }, { "lang": "en", "time": "2024-01-30T00:00:00+00:00", "value": "Made public." } ], "title": "389-ds-base: a heap overflow leading to denail-of-servce while writing a value larger than 256 chars (in log_entry_attr)", "workarounds": [ { "lang": "en", "value": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability." } ], "x_redhatCweChain": "CWE-122: Heap-based Buffer Overflow" } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2024-1062", "datePublished": "2024-02-12T13:04:39.944Z", "dateReserved": "2024-01-30T08:40:08.731Z", "dateUpdated": "2024-12-04T14:20:42.482Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-0889
Vulnerability from cvelistv5
Published
2008-03-20 00:00
Modified
2024-08-07 08:01
Severity ?
EPSS score ?
Summary
Red Hat Directory Server 8.0, when running on Red Hat Enterprise Linux, uses insecure permissions for the redhat-idm-console script, which allows local users to execute arbitrary code by modifying the script.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1019677 | vdb-entry, x_refsource_SECTRACK | |
http://www.redhat.com/support/errata/RHSA-2008-0191.html | vendor-advisory, x_refsource_REDHAT | |
http://secunia.com/advisories/29482 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/28327 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:01:40.070Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1019677", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019677" }, { "name": "RHSA-2008:0191", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0191.html" }, { "name": "29482", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29482" }, { "name": "28327", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28327" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Red Hat Directory Server 8.0, when running on Red Hat Enterprise Linux, uses insecure permissions for the redhat-idm-console script, which allows local users to execute arbitrary code by modifying the script." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-04-01T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "1019677", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019677" }, { "name": "RHSA-2008:0191", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0191.html" }, { "name": "29482", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29482" }, { "name": "28327", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28327" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-0889", "datePublished": "2008-03-20T00:00:00", "dateReserved": "2008-02-21T00:00:00", "dateUpdated": "2024-08-07T08:01:40.070Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-0892
Vulnerability from cvelistv5
Published
2008-04-16 18:00
Modified
2024-08-07 08:01
Severity ?
EPSS score ?
Summary
The replication monitor CGI script (repl-monitor-cgi.pl) in Red Hat Administration Server, as used by Red Hat Directory Server 8.0 EL4 and EL5, allows remote attackers to execute arbitrary commands.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:01:40.080Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "rhds-replmonitor-command-execution(41840)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41840" }, { "name": "FEDORA-2008-3220", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00386.html" }, { "name": "HPSBUX02324", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01433676" }, { "name": "30114", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30114" }, { "name": "1019856", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019856" }, { "name": "28802", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28802" }, { "name": "SSRT080034", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01433676" }, { "name": "RHSA-2008:0201", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0201.html" }, { "name": "FEDORA-2008-3214", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00380.html" }, { "name": "ADV-2008-1449", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1449/references" }, { "name": "RHSA-2008:0199", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0199.html" }, { "name": "29761", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29761" }, { "name": "29826", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29826" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=437301" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-04-16T00:00:00", "descriptions": [ { "lang": "en", "value": "The replication monitor CGI script (repl-monitor-cgi.pl) in Red Hat Administration Server, as used by Red Hat Directory Server 8.0 EL4 and EL5, allows remote attackers to execute arbitrary commands." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "rhds-replmonitor-command-execution(41840)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41840" }, { "name": "FEDORA-2008-3220", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00386.html" }, { "name": "HPSBUX02324", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01433676" }, { "name": "30114", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30114" }, { "name": "1019856", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019856" }, { "name": "28802", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28802" }, { "name": "SSRT080034", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01433676" }, { "name": "RHSA-2008:0201", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0201.html" }, { "name": "FEDORA-2008-3214", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00380.html" }, { "name": "ADV-2008-1449", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1449/references" }, { "name": "RHSA-2008:0199", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0199.html" }, { "name": "29761", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29761" }, { "name": "29826", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29826" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=437301" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2008-0892", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The replication monitor CGI script (repl-monitor-cgi.pl) in Red Hat Administration Server, as used by Red Hat Directory Server 8.0 EL4 and EL5, allows remote attackers to execute arbitrary commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "rhds-replmonitor-command-execution(41840)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41840" }, { "name": "FEDORA-2008-3220", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00386.html" }, { "name": "HPSBUX02324", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01433676" }, { "name": "30114", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30114" }, { "name": "1019856", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019856" }, { "name": "28802", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28802" }, { "name": "SSRT080034", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01433676" }, { "name": "RHSA-2008:0201", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0201.html" }, { "name": "FEDORA-2008-3214", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00380.html" }, { "name": "ADV-2008-1449", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1449/references" }, { "name": "RHSA-2008:0199", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0199.html" }, { "name": "29761", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29761" }, { "name": "29826", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29826" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=437301", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=437301" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-0892", "datePublished": "2008-04-16T18:00:00", "dateReserved": "2008-02-21T00:00:00", "dateUpdated": "2024-08-07T08:01:40.080Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-2678
Vulnerability from cvelistv5
Published
2012-07-03 16:00
Modified
2024-08-06 19:42
Severity ?
EPSS score ?
Summary
389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), after the password for a LDAP user has been changed and before the server has been reset, allows remote attackers to read the plaintext password via the unhashed#user#password attribute.
References
▼ | URL | Tags |
---|---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19353 | vdb-entry, signature, x_refsource_OVAL | |
http://secunia.com/advisories/49734 | third-party-advisory, x_refsource_SECUNIA | |
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083 | vendor-advisory, x_refsource_HP | |
http://osvdb.org/83336 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/54153 | vdb-entry, x_refsource_BID | |
http://directory.fedoraproject.org/wiki/Release_Notes | x_refsource_CONFIRM | |
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083 | vendor-advisory, x_refsource_HP | |
http://rhn.redhat.com/errata/RHSA-2012-1041.html | vendor-advisory, x_refsource_REDHAT | |
http://rhn.redhat.com/errata/RHSA-2012-0997.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:42:31.470Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:19353", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19353" }, { "name": "49734", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49734" }, { "name": "SSRT101189", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083" }, { "name": "83336", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/83336" }, { "name": "54153", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/54153" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://directory.fedoraproject.org/wiki/Release_Notes" }, { "name": "HPSBUX02881", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083" }, { "name": "RHSA-2012:1041", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1041.html" }, { "name": "RHSA-2012:0997", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0997.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-06-26T00:00:00", "descriptions": [ { "lang": "en", "value": "389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), after the password for a LDAP user has been changed and before the server has been reset, allows remote attackers to read the plaintext password via the unhashed#user#password attribute." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "oval:org.mitre.oval:def:19353", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19353" }, { "name": "49734", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49734" }, { "name": "SSRT101189", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083" }, { "name": "83336", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/83336" }, { "name": "54153", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/54153" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://directory.fedoraproject.org/wiki/Release_Notes" }, { "name": "HPSBUX02881", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083" }, { "name": "RHSA-2012:1041", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1041.html" }, { "name": "RHSA-2012:0997", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0997.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-2678", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), after the password for a LDAP user has been changed and before the server has been reset, allows remote attackers to read the plaintext password via the unhashed#user#password attribute." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:19353", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19353" }, { "name": "49734", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49734" }, { "name": "SSRT101189", "refsource": "HP", "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083" }, { "name": "83336", "refsource": "OSVDB", "url": "http://osvdb.org/83336" }, { "name": "54153", "refsource": "BID", "url": "http://www.securityfocus.com/bid/54153" }, { "name": "http://directory.fedoraproject.org/wiki/Release_Notes", "refsource": "CONFIRM", "url": "http://directory.fedoraproject.org/wiki/Release_Notes" }, { "name": "HPSBUX02881", "refsource": "HP", "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083" }, { "name": "RHSA-2012:1041", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-1041.html" }, { "name": "RHSA-2012:0997", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-0997.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-2678", "datePublished": "2012-07-03T16:00:00", "dateReserved": "2012-05-14T00:00:00", "dateUpdated": "2024-08-06T19:42:31.470Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-3562
Vulnerability from cvelistv5
Published
2014-08-21 14:00
Modified
2024-08-06 10:50
Severity ?
EPSS score ?
Summary
Red Hat Directory Server 8 and 389 Directory Server, when debugging is enabled, allows remote attackers to obtain sensitive replicated metadata by searching the directory.
References
▼ | URL | Tags |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2014-1031.html | vendor-advisory, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=1123477 | x_refsource_CONFIRM | |
http://rhn.redhat.com/errata/RHSA-2014-1032.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:50:17.515Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2014:1031", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1031.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1123477" }, { "name": "RHSA-2014:1032", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1032.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-08-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Red Hat Directory Server 8 and 389 Directory Server, when debugging is enabled, allows remote attackers to obtain sensitive replicated metadata by searching the directory." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-08-21T12:57:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2014:1031", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1031.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1123477" }, { "name": "RHSA-2014:1032", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1032.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-3562", "datePublished": "2014-08-21T14:00:00", "dateReserved": "2014-05-14T00:00:00", "dateUpdated": "2024-08-06T10:50:17.515Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2241
Vulnerability from cvelistv5
Published
2010-08-17 17:31
Modified
2024-08-07 02:25
Severity ?
EPSS score ?
Summary
The (1) setup-ds.pl and (2) setup-ds-admin.pl setup scripts for Red Hat Directory Server 8 before 8.2 use world-readable permissions when creating cache files, which allows local users to obtain sensitive information including passwords for Directory and Administration Server administrative accounts.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1024281 | vdb-entry, x_refsource_SECTRACK | |
http://www.osvdb.org/66962 | vdb-entry, x_refsource_OSVDB | |
https://bugzilla.redhat.com/show_bug.cgi?id=608032 | x_refsource_CONFIRM | |
http://rhn.redhat.com/errata/RHSA-2010-0590.html | vendor-advisory, x_refsource_REDHAT | |
http://secunia.com/advisories/40811 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:25:07.471Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024281", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024281" }, { "name": "66962", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/66962" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=608032" }, { "name": "RHSA-2010:0590", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2010-0590.html" }, { "name": "40811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40811" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The (1) setup-ds.pl and (2) setup-ds-admin.pl setup scripts for Red Hat Directory Server 8 before 8.2 use world-readable permissions when creating cache files, which allows local users to obtain sensitive information including passwords for Directory and Administration Server administrative accounts." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-08-17T17:31:00Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "1024281", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024281" }, { "name": "66962", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/66962" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=608032" }, { "name": "RHSA-2010:0590", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2010-0590.html" }, { "name": "40811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40811" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-2241", "datePublished": "2010-08-17T17:31:00Z", "dateReserved": "2010-06-09T00:00:00Z", "dateUpdated": "2024-08-07T02:25:07.471Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2222
Vulnerability from cvelistv5
Published
2019-11-05 19:27
Modified
2024-08-07 02:25
Severity ?
EPSS score ?
Summary
The _ger_parse_control function in Red Hat Directory Server 8 and the 389 Directory Server allows attackers to cause a denial of service (NULL pointer dereference) via a crafted search query.
References
▼ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2222 | x_refsource_MISC | |
https://access.redhat.com/security/cve/cve-2010-2222 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Red Hat | Red Hat Directory Server |
Version: 8 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:25:07.182Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2222" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://access.redhat.com/security/cve/cve-2010-2222" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Red Hat Directory Server", "vendor": "Red Hat", "versions": [ { "status": "affected", "version": "8" } ] } ], "datePublic": "2010-07-01T00:00:00", "descriptions": [ { "lang": "en", "value": "The _ger_parse_control function in Red Hat Directory Server 8 and the 389 Directory Server allows attackers to cause a denial of service (NULL pointer dereference) via a crafted search query." } ], "problemTypes": [ { "descriptions": [ { "description": "Other", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-05T19:27:47", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2222" }, { "tags": [ "x_refsource_MISC" ], "url": "https://access.redhat.com/security/cve/cve-2010-2222" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-2222", "datePublished": "2019-11-05T19:27:47", "dateReserved": "2010-06-09T00:00:00", "dateUpdated": "2024-08-07T02:25:07.182Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0022
Vulnerability from cvelistv5
Published
2011-02-23 18:00
Modified
2024-08-06 21:43
Severity ?
EPSS score ?
Summary
The setup scripts in 389 Directory Server 1.2.x (aka Red Hat Directory Server 8.2.x), when multiple unprivileged instances are configured, use 0777 permissions for the /var/run/dirsrv directory, which allows local users to cause a denial of service (daemon outage or arbitrary process termination) by replacing PID files contained in this directory.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1025102 | vdb-entry, x_refsource_SECTRACK | |
http://www.redhat.com/support/errata/RHSA-2011-0293.html | vendor-advisory, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=671199 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/46489 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:43:13.719Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1025102", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025102" }, { "name": "RHSA-2011:0293", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0293.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=671199" }, { "name": "46489", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46489" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-22T00:00:00", "descriptions": [ { "lang": "en", "value": "The setup scripts in 389 Directory Server 1.2.x (aka Red Hat Directory Server 8.2.x), when multiple unprivileged instances are configured, use 0777 permissions for the /var/run/dirsrv directory, which allows local users to cause a denial of service (daemon outage or arbitrary process termination) by replacing PID files contained in this directory." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-03-31T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "1025102", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025102" }, { "name": "RHSA-2011:0293", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0293.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=671199" }, { "name": "46489", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46489" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-0022", "datePublished": "2011-02-23T18:00:00", "dateReserved": "2010-12-07T00:00:00", "dateUpdated": "2024-08-06T21:43:13.719Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0019
Vulnerability from cvelistv5
Published
2011-02-23 18:00
Modified
2024-08-06 21:36
Severity ?
EPSS score ?
Summary
slapd (aka ns-slapd) in 389 Directory Server 1.2.7.5 (aka Red Hat Directory Server 8.2.x or dirsrv) does not properly handle simple paged result searches, which allows remote attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact via multiple search requests.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1025102 | vdb-entry, x_refsource_SECTRACK | |
https://bugzilla.redhat.com/show_bug.cgi?id=666076 | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=670914 | x_refsource_CONFIRM | |
http://www.redhat.com/support/errata/RHSA-2011-0293.html | vendor-advisory, x_refsource_REDHAT | |
http://www.securityfocus.com/bid/46489 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:36:02.300Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1025102", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025102" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=666076" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=670914" }, { "name": "RHSA-2011:0293", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0293.html" }, { "name": "46489", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46489" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-22T00:00:00", "descriptions": [ { "lang": "en", "value": "slapd (aka ns-slapd) in 389 Directory Server 1.2.7.5 (aka Red Hat Directory Server 8.2.x or dirsrv) does not properly handle simple paged result searches, which allows remote attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact via multiple search requests." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-03-31T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "1025102", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025102" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=666076" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=670914" }, { "name": "RHSA-2011:0293", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0293.html" }, { "name": "46489", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46489" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-0019", "datePublished": "2011-02-23T18:00:00", "dateReserved": "2010-12-07T00:00:00", "dateUpdated": "2024-08-06T21:36:02.300Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-3283
Vulnerability from cvelistv5
Published
2008-08-29 18:00
Modified
2024-08-07 09:28
Severity ?
EPSS score ?
Summary
Multiple memory leaks in Red Hat Directory Server 7.1 before SP7, Red Hat Directory Server 8, and Fedora Directory Server 1.1.1 and earlier allow remote attackers to cause a denial of service (memory consumption) via vectors involving (1) the authentication / bind phase and (2) anonymous LDAP search requests.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:28:41.997Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=458977" }, { "name": "1020774", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1020774" }, { "name": "RHSA-2008:0602", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0602.html" }, { "name": "rhds-leaks-dos(44731)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44731" }, { "name": "SSRT080113", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "name": "31913", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31913" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html" }, { "name": "31702", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31702" }, { "name": "RHSA-2008:0596", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2008-0596.html" }, { "name": "31867", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31867" }, { "name": "HPSBUX02354", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "name": "30872", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/30872" }, { "name": "oval:org.mitre.oval:def:6118", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6118" }, { "name": "ADV-2008-2480", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2480" }, { "name": "FEDORA-2008-7891", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00708.html" }, { "name": "RHSA-2008:0858", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0858.html" }, { "name": "31565", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31565" }, { "name": "31627", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31627" }, { "name": "FEDORA-2008-7813", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00521.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-08-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple memory leaks in Red Hat Directory Server 7.1 before SP7, Red Hat Directory Server 8, and Fedora Directory Server 1.1.1 and earlier allow remote attackers to cause a denial of service (memory consumption) via vectors involving (1) the authentication / bind phase and (2) anonymous LDAP search requests." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=458977" }, { "name": "1020774", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1020774" }, { "name": "RHSA-2008:0602", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0602.html" }, { "name": "rhds-leaks-dos(44731)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44731" }, { "name": "SSRT080113", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "name": "31913", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31913" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html" }, { "name": "31702", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31702" }, { "name": "RHSA-2008:0596", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2008-0596.html" }, { "name": "31867", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31867" }, { "name": "HPSBUX02354", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "name": "30872", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/30872" }, { "name": "oval:org.mitre.oval:def:6118", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6118" }, { "name": "ADV-2008-2480", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2480" }, { "name": "FEDORA-2008-7891", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00708.html" }, { "name": "RHSA-2008:0858", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0858.html" }, { "name": "31565", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31565" }, { "name": "31627", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31627" }, { "name": "FEDORA-2008-7813", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00521.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2008-3283", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple memory leaks in Red Hat Directory Server 7.1 before SP7, Red Hat Directory Server 8, and Fedora Directory Server 1.1.1 and earlier allow remote attackers to cause a denial of service (memory consumption) via vectors involving (1) the authentication / bind phase and (2) anonymous LDAP search requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=458977", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=458977" }, { "name": "1020774", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1020774" }, { "name": "RHSA-2008:0602", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0602.html" }, { "name": "rhds-leaks-dos(44731)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44731" }, { "name": "SSRT080113", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "name": "31913", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31913" }, { "name": "http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html", "refsource": "CONFIRM", "url": "http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html" }, { "name": "31702", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31702" }, { "name": "RHSA-2008:0596", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2008-0596.html" }, { "name": "31867", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31867" }, { "name": "HPSBUX02354", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "name": "30872", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30872" }, { "name": "oval:org.mitre.oval:def:6118", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6118" }, { "name": "ADV-2008-2480", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2480" }, { "name": "FEDORA-2008-7891", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00708.html" }, { "name": "RHSA-2008:0858", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0858.html" }, { "name": "31565", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31565" }, { "name": "31627", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31627" }, { "name": "FEDORA-2008-7813", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00521.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-3283", "datePublished": "2008-08-29T18:00:00", "dateReserved": "2008-07-24T00:00:00", "dateUpdated": "2024-08-07T09:28:41.997Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-0893
Vulnerability from cvelistv5
Published
2008-04-16 18:00
Modified
2024-08-07 08:01
Severity ?
EPSS score ?
Summary
Red Hat Administration Server, as used by Red Hat Directory Server 8.0 EL4 and EL5, does not properly restrict access to CGI scripts, which allows remote attackers to perform administrative actions.
References
▼ | URL | Tags |
---|---|---|
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00386.html | vendor-advisory, x_refsource_FEDORA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41843 | vdb-entry, x_refsource_XF | |
http://www.securitytracker.com/id?1019857 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/28802 | vdb-entry, x_refsource_BID | |
http://www.redhat.com/support/errata/RHSA-2008-0201.html | vendor-advisory, x_refsource_REDHAT | |
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00380.html | vendor-advisory, x_refsource_FEDORA | |
http://secunia.com/advisories/29761 | third-party-advisory, x_refsource_SECUNIA | |
https://bugzilla.redhat.com/show_bug.cgi?id=437320 | x_refsource_CONFIRM | |
http://secunia.com/advisories/29826 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:01:39.931Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2008-3220", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00386.html" }, { "name": "rhds-cgiscripts-security-bypass(41843)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41843" }, { "name": "1019857", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019857" }, { "name": "28802", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28802" }, { "name": "RHSA-2008:0201", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0201.html" }, { "name": "FEDORA-2008-3214", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00380.html" }, { "name": "29761", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29761" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=437320" }, { "name": "29826", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29826" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-04-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Red Hat Administration Server, as used by Red Hat Directory Server 8.0 EL4 and EL5, does not properly restrict access to CGI scripts, which allows remote attackers to perform administrative actions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "FEDORA-2008-3220", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00386.html" }, { "name": "rhds-cgiscripts-security-bypass(41843)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41843" }, { "name": "1019857", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019857" }, { "name": "28802", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28802" }, { "name": "RHSA-2008:0201", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0201.html" }, { "name": "FEDORA-2008-3214", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00380.html" }, { "name": "29761", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29761" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=437320" }, { "name": "29826", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29826" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-0893", "datePublished": "2008-04-16T18:00:00", "dateReserved": "2008-02-21T00:00:00", "dateUpdated": "2024-08-07T08:01:39.931Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-2930
Vulnerability from cvelistv5
Published
2008-08-29 18:00
Modified
2024-08-07 09:21
Severity ?
EPSS score ?
Summary
Red Hat Directory Server 7.1 before SP7, Red Hat Directory Server 8, and Fedora Directory Server 1.1.1 allow remote attackers to cause a denial of service (CPU consumption and search outage) via crafted LDAP search requests with patterns, related to a single-threaded regular-expression subsystem.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:21:34.500Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "rhds-ldapsearch-dos(44733)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44733" }, { "name": "oval:org.mitre.oval:def:6078", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6078" }, { "name": "RHSA-2008:0602", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0602.html" }, { "name": "SSRT080113", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html" }, { "name": "31702", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31702" }, { "name": "RHSA-2008:0596", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2008-0596.html" }, { "name": "31867", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31867" }, { "name": "HPSBUX02354", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "name": "ADV-2008-2480", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2480" }, { "name": "30871", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/30871" }, { "name": "FEDORA-2008-7891", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00708.html" }, { "name": "RHSA-2008:0858", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0858.html" }, { "name": "1020773", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1020773" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454065" }, { "name": "31565", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31565" }, { "name": "31627", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31627" }, { "name": "FEDORA-2008-7813", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00521.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-08-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Red Hat Directory Server 7.1 before SP7, Red Hat Directory Server 8, and Fedora Directory Server 1.1.1 allow remote attackers to cause a denial of service (CPU consumption and search outage) via crafted LDAP search requests with patterns, related to a single-threaded regular-expression subsystem." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "rhds-ldapsearch-dos(44733)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44733" }, { "name": "oval:org.mitre.oval:def:6078", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6078" }, { "name": "RHSA-2008:0602", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0602.html" }, { "name": "SSRT080113", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html" }, { "name": "31702", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31702" }, { "name": "RHSA-2008:0596", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2008-0596.html" }, { "name": "31867", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31867" }, { "name": "HPSBUX02354", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "name": "ADV-2008-2480", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2480" }, { "name": "30871", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/30871" }, { "name": "FEDORA-2008-7891", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00708.html" }, { "name": "RHSA-2008:0858", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0858.html" }, { "name": "1020773", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1020773" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454065" }, { "name": "31565", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31565" }, { "name": "31627", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31627" }, { "name": "FEDORA-2008-7813", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00521.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2008-2930", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Red Hat Directory Server 7.1 before SP7, Red Hat Directory Server 8, and Fedora Directory Server 1.1.1 allow remote attackers to cause a denial of service (CPU consumption and search outage) via crafted LDAP search requests with patterns, related to a single-threaded regular-expression subsystem." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "rhds-ldapsearch-dos(44733)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44733" }, { "name": "oval:org.mitre.oval:def:6078", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6078" }, { "name": "RHSA-2008:0602", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0602.html" }, { "name": "SSRT080113", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "name": "http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html", "refsource": "CONFIRM", "url": "http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html" }, { "name": "31702", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31702" }, { "name": "RHSA-2008:0596", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2008-0596.html" }, { "name": "31867", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31867" }, { "name": "HPSBUX02354", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "name": "ADV-2008-2480", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2480" }, { "name": "30871", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30871" }, { "name": "FEDORA-2008-7891", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00708.html" }, { "name": "RHSA-2008:0858", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0858.html" }, { "name": "1020773", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1020773" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=454065", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454065" }, { "name": "31565", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31565" }, { "name": "31627", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31627" }, { "name": "FEDORA-2008-7813", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00521.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-2930", "datePublished": "2008-08-29T18:00:00", "dateReserved": "2008-06-30T00:00:00", "dateUpdated": "2024-08-07T09:21:34.500Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2022-10-14 18:15
Modified
2024-11-21 07:01
Severity ?
Summary
A flaw was found In 389-ds-base. When the Content Synchronization plugin is enabled, an authenticated user can reach a NULL pointer dereference using a specially crafted query. This flaw allows an authenticated attacker to cause a denial of service. This CVE is assigned against an incomplete fix of CVE-2021-3514.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2022-2850 | Exploit, Vendor Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2118691 | Exploit, Issue Tracking, Vendor Advisory | |
secalert@redhat.com | https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/CVE-2022-2850 | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=2118691 | Exploit, Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html | Mailing List, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | directory_server | 11.0 | |
redhat | directory_server | 12.0 | |
redhat | enterprise_linux | 6.0 | |
redhat | enterprise_linux | 7.0 | |
redhat | enterprise_linux | 8.0 | |
redhat | enterprise_linux | 9.0 | |
fedoraproject | fedora | 35 | |
fedoraproject | fedora | 36 | |
port389 | 389-ds-base | * | |
debian | debian_linux | 10.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:directory_server:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "2A169F6D-88A5-4631-9D30-519350ACFE6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "A3DAF61A-58A9-41A6-A4DC-64148055B0C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:port389:389-ds-base:*:*:*:*:*:*:*:*", "matchCriteriaId": "054799AD-A5F0-4A96-AE9F-6C902CD5D1C7", "versionEndIncluding": "2.4.1", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found In 389-ds-base. When the Content Synchronization plugin is enabled, an authenticated user can reach a NULL pointer dereference using a specially crafted query. This flaw allows an authenticated attacker to cause a denial of service. This CVE is assigned against an incomplete fix of CVE-2021-3514." }, { "lang": "es", "value": "Se ha encontrado un fallo en 389-ds-base. Cuando el plugin de sincronizaci\u00f3n de contenidos est\u00e1 habilitado, un usuario autenticado puede llegar a una desreferencia de puntero NULL usando una consulta especialmente dise\u00f1ada. Este fallo permite a un atacante autenticado causar una denegaci\u00f3n de servicio. Esta CVE est\u00e1 asignada a una correcci\u00f3n incompleta de CVE-2021-3514" } ], "id": "CVE-2022-2850", "lastModified": "2024-11-21T07:01:48.380", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-14T18:15:14.980", "references": [ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2022-2850" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2118691" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2022-2850" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2118691" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-23 19:00
Modified
2024-11-21 01:23
Severity ?
Summary
The setup scripts in 389 Directory Server 1.2.x (aka Red Hat Directory Server 8.2.x), when multiple unprivileged instances are configured, use 0777 permissions for the /var/run/dirsrv directory, which allows local users to cause a denial of service (daemon outage or arbitrary process termination) by replacing PID files contained in this directory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fedoraproject | 389_directory_server | 1.2.1 | |
fedoraproject | 389_directory_server | 1.2.2 | |
fedoraproject | 389_directory_server | 1.2.3 | |
fedoraproject | 389_directory_server | 1.2.5 | |
fedoraproject | 389_directory_server | 1.2.5 | |
fedoraproject | 389_directory_server | 1.2.5 | |
fedoraproject | 389_directory_server | 1.2.5 | |
fedoraproject | 389_directory_server | 1.2.5 | |
fedoraproject | 389_directory_server | 1.2.6 | |
fedoraproject | 389_directory_server | 1.2.6 | |
fedoraproject | 389_directory_server | 1.2.6 | |
fedoraproject | 389_directory_server | 1.2.6 | |
fedoraproject | 389_directory_server | 1.2.6 | |
fedoraproject | 389_directory_server | 1.2.6 | |
fedoraproject | 389_directory_server | 1.2.6 | |
fedoraproject | 389_directory_server | 1.2.6 | |
fedoraproject | 389_directory_server | 1.2.6 | |
fedoraproject | 389_directory_server | 1.2.6.1 | |
fedoraproject | 389_directory_server | 1.2.7 | |
fedoraproject | 389_directory_server | 1.2.7.5 | |
fedoraproject | 389_directory_server | 1.2.8 | |
fedoraproject | 389_directory_server | 1.2.8 | |
redhat | directory_server | 8.2 | |
redhat | directory_server | 8.2.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "CE2E9C8D-FFEE-424C-BBA6-42BD4309D18A", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F2E9CEF-F30D-4374-A7E2-052102B602A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "16A8729B-B00B-4871-B083-6B10A5034721", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "6335FA65-9498-40AF-AE2B-034DA2823821", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "8CF92ADB-B5B0-43D7-93D8-CBA3AE46EB8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc2:*:*:*:*:*:*", "matchCriteriaId": "17F8ED59-E27A-4B9B-8BB8-66FAB2B2DCFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc3:*:*:*:*:*:*", "matchCriteriaId": "4200CEAB-4E14-48C8-9D6F-F86796475019", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc4:*:*:*:*:*:*", "matchCriteriaId": "3179916B-F98C-4D10-82AB-59DCCACBE8DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "B44B5289-08BB-4D62-B60D-1BD738472B1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a2:*:*:*:*:*:*", "matchCriteriaId": "02392BBF-AFAB-4739-BAF6-E930692AB28F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a3:*:*:*:*:*:*", "matchCriteriaId": "BFF70436-E01E-4912-AC31-B600F5E8CB4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a4:*:*:*:*:*:*", "matchCriteriaId": "360BA51B-B47E-4537-B564-9E628DF4E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "987F04BC-75DC-4959-AE32-070F11F9EBC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "078BCE55-90BB-48DE-92D1-9A152338158C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc3:*:*:*:*:*:*", "matchCriteriaId": "595F5AEE-E4A9-40E0-AF03-69AF689C4916", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc6:*:*:*:*:*:*", "matchCriteriaId": "FED47519-F254-4545-8551-FFBD0B4F9FAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc7:*:*:*:*:*:*", "matchCriteriaId": "A06C0421-74B7-4F9D-9F3A-18BF62BDD4D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "83F772DF-B8A7-4577-9AC6-3234B8C7FFAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.7:alpha3:*:*:*:*:*:*", "matchCriteriaId": "60624BFB-BB50-47F9-BB6D-BC92B40988BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "17C879AE-7435-43F5-94E5-A7ED84E46D0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha1:*:*:*:*:*:*", "matchCriteriaId": "5809DC7B-AC50-4E03-A8FA-6C2C6B67A400", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha2:*:*:*:*:*:*", "matchCriteriaId": "04FED7B7-7D97-4020-9D5C-A7150B43838C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:directory_server:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "EDC61481-16C5-44EF-AA40-8423A40B2581", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C92B4226-6D3D-4430-A753-92E828FBBB8C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The setup scripts in 389 Directory Server 1.2.x (aka Red Hat Directory Server 8.2.x), when multiple unprivileged instances are configured, use 0777 permissions for the /var/run/dirsrv directory, which allows local users to cause a denial of service (daemon outage or arbitrary process termination) by replacing PID files contained in this directory." }, { "lang": "es", "value": "Las secuencias de comandos de configuraci\u00f3n en 389 Directory Server v1.2.x (tambi\u00e9n conocido como Red Hat Directory Server 8.2.x)), cuando varias instancias sin privilegios est\u00e1n configuradas, usa permisos 0777 para el directorio /var/run/dirsrv, que permite a usuarios locales provocar una denegaci\u00f3n de servicios (fallo de demonio o terminaci\u00f3n de procesos de su elecci\u00f3n) mediante la sustituci\u00f3n de los archivos PID contenidos en este directorio." } ], "id": "CVE-2011-0022", "lastModified": "2024-11-21T01:23:08.587", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-23T19:00:01.813", "references": [ { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2011-0293.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/46489" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1025102" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=671199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0293.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46489" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025102" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=671199" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-05 20:15
Modified
2024-11-21 01:16
Severity ?
Summary
The _ger_parse_control function in Red Hat Directory Server 8 and the 389 Directory Server allows attackers to cause a denial of service (NULL pointer dereference) via a crafted search query.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://access.redhat.com/security/cve/cve-2010-2222 | Vendor Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2222 | Issue Tracking, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/cve-2010-2222 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2222 | Issue Tracking, Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | directory_server | 8.0 | |
redhat | 389_directory_server | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:directory_server:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E190C97-A279-4EEE-B9C4-1EA888920F80", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:389_directory_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "A861110D-0BBC-4052-BBFD-F718F6CD72C5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The _ger_parse_control function in Red Hat Directory Server 8 and the 389 Directory Server allows attackers to cause a denial of service (NULL pointer dereference) via a crafted search query." }, { "lang": "es", "value": "La funci\u00f3n _ger_parse_control en Red Hat Directory Server 8 y 389 Directory Server, permite a atacantes causar una denegaci\u00f3n de servicio (desreferencia del puntero NULL) por medio de una consulta de b\u00fasqueda especialmente dise\u00f1ada." } ], "id": "CVE-2010-2222", "lastModified": "2024-11-21T01:16:11.010", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-05T20:15:10.453", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/security/cve/cve-2010-2222" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/security/cve/cve-2010-2222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2222" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-07-09 17:15
Modified
2024-11-21 09:49
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
A flaw was found in the 389 Directory Server. This flaw allows an unauthenticated user to cause a systematic server crash while sending a specific extended search request, leading to a denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | directory_server | 12.0 | |
redhat | 389_directory_server | - | |
redhat | enterprise_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:directory_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "A3DAF61A-58A9-41A6-A4DC-64148055B0C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:389_directory_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "A861110D-0BBC-4052-BBFD-F718F6CD72C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in the 389 Directory Server. This flaw allows an unauthenticated user to cause a systematic server crash while sending a specific extended search request, leading to a denial of service." }, { "lang": "es", "value": "Se encontr\u00f3 un fallo en 389 Directory Server. Este fallo permite que un usuario no autenticado provoque un fallo sistem\u00e1tico del servidor mientras env\u00eda una solicitud de b\u00fasqueda extendida espec\u00edfica, lo que lleva a una denegaci\u00f3n de servicio." } ], "id": "CVE-2024-6237", "lastModified": "2024-11-21T09:49:15.300", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-07-09T17:15:48.960", "references": [ { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:4997" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:5192" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2024-6237" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293579" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/389ds/389-ds-base/issues/5989" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2024-6237" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293579" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/389ds/389-ds-base/issues/5989" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-230" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-01-09 21:15
Modified
2024-11-21 01:18
Severity ?
Summary
389 Directory Server before 1.2.7.1 (aka Red Hat Directory Server 8.2) and HP-UX Directory Server before B.08.10.03, when audit logging is enabled, logs the Directory Manager password (nsslapd-rootpw) in cleartext when changing cn=config:nsslapd-rootpw, which might allow local users to obtain sensitive information by reading the log.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
hp | hp-ux_directory_server | * | |
redhat | redhat_directory_server | * | |
fedoraproject | 389_directory_server | * | |
redhat | directory_server | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:hp-ux_directory_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "9F804818-D589-41B4-B3B0-5F7D522FE7DF", "versionEndExcluding": "b.08.10.03", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:redhat_directory_server:*:*:*:*:*:hp-ux:*:*", "matchCriteriaId": "2513BFA8-9F43-4102-8C65-522955FB8821", "versionEndExcluding": "b.08.00.02", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "84F57181-500B-47A6-A4E1-827BF398913D", "versionEndExcluding": "1.2.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:directory_server:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E190C97-A279-4EEE-B9C4-1EA888920F80", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "389 Directory Server before 1.2.7.1 (aka Red Hat Directory Server 8.2) and HP-UX Directory Server before B.08.10.03, when audit logging is enabled, logs the Directory Manager password (nsslapd-rootpw) in cleartext when changing cn=config:nsslapd-rootpw, which might allow local users to obtain sensitive information by reading the log." }, { "lang": "es", "value": "389 Directory Server versiones anteriores a 1.2.7.1 (tambi\u00e9n se conoce como Red Hat Directory Server versi\u00f3n 8.2) y HP-UX Directory Server versiones anteriores a B.08.10.03, cuando el registro de auditor\u00eda est\u00e1 habilitado, registra la contrase\u00f1a de Directory Manager (nsslapd-rootpw) en texto sin cifrar cuando se cambia cn=config:nsslapd-rootpw, que podr\u00eda permitir a usuarios locales obtener informaci\u00f3n confidencial mediante la lectura del registro." } ], "id": "CVE-2010-3282", "lastModified": "2024-11-21T01:18:26.053", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-09T21:15:10.810", "references": [ { "source": "hp-security-alert@hp.com", "tags": [ "Not Applicable" ], "url": "http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6914" }, { "source": "hp-security-alert@hp.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=625950" }, { "source": "hp-security-alert@hp.com", "tags": [ "Product" ], "url": "https://git.fedorahosted.org/cgit/389/ds.git/commit/?id=d38ae06" }, { "source": "hp-security-alert@hp.com", "tags": [ "Vendor Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c02522633\u0026docLocale=en_US" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6914" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=625950" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://git.fedorahosted.org/cgit/389/ds.git/commit/?id=d38ae06" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c02522633\u0026docLocale=en_US" } ], "sourceIdentifier": "hp-security-alert@hp.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-312" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-07-31 13:20
Modified
2024-11-21 01:51
Severity ?
Summary
The Red Hat Directory Server before 8.2.11-13 and 389 Directory Server do not properly restrict access to entity attributes, which allows remote authenticated users to obtain sensitive information via a search query for the attribute.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fedoraproject | 389_directory_server | - | |
redhat | directory_server | * | |
redhat | directory_server | 7.1 | |
redhat | directory_server | 8.0 | |
redhat | directory_server | 8.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "65E209CD-4A5F-48F1-BA57-3145757D2C23", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5481052-D318-4F67-9567-79157BC716D0", "versionEndIncluding": "8.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "ABADB3F7-AD65-4E62-BEA5-782539911B6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E190C97-A279-4EEE-B9C4-1EA888920F80", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2D75336B-F1E7-4369-B11D-1B132CA45424", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Red Hat Directory Server before 8.2.11-13 and 389 Directory Server do not properly restrict access to entity attributes, which allows remote authenticated users to obtain sensitive information via a search query for the attribute." }, { "lang": "es", "value": "El Red Hat Directory Server 8.2.11-13 y 389 Directory Server, no restringe adecuadamente los atributos de entidad, lo que permite a usuarios autenticados remotamente obtener informaci\u00f3n sensible a trav\u00e9s de una consulta de b\u00fasqueda hacia ese atributo." } ], "id": "CVE-2013-2219", "lastModified": "2024-11-21T01:51:16.293", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-07-31T13:20:25.577", "references": [ { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-1116.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-1119.html" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=979508" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-1116.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-1119.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=979508" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-08-29 18:41
Modified
2024-11-21 00:48
Severity ?
Summary
Red Hat Directory Server 7.1 before SP7, Red Hat Directory Server 8, and Fedora Directory Server 1.1.1 allow remote attackers to cause a denial of service (CPU consumption and search outage) via crafted LDAP search requests with patterns, related to a single-threaded regular-expression subsystem.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fedora | directory_server | 1.1.1 | |
redhat | directory_server | 7.1 | |
redhat | directory_server | 7.1 | |
redhat | directory_server | 7.1 | |
redhat | directory_server | 7.1 | |
redhat | directory_server | 7.1 | |
redhat | directory_server | 7.1 | |
redhat | directory_server | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fedora:directory_server:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "662D91E0-D891-4B30-B4D1-FA7FFACBF148", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "2060B92C-72E4-4FAF-9CB6-C6142F6DDE7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "7A7C6A16-F928-4682-BCCA-D004FB4781B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "374634C4-D913-46B3-AB98-1E3573814E5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "B58F8C3A-C0F5-400A-823F-F92F71B385EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp5:*:*:*:*:*:*", "matchCriteriaId": "1F47246B-7393-4F61-88F5-2B8A2211C46F", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp6:*:*:*:*:*:*", "matchCriteriaId": "325755C1-03E1-4947-A5A0-9FEBB0DC4E89", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E190C97-A279-4EEE-B9C4-1EA888920F80", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Red Hat Directory Server 7.1 before SP7, Red Hat Directory Server 8, and Fedora Directory Server 1.1.1 allow remote attackers to cause a denial of service (CPU consumption and search outage) via crafted LDAP search requests with patterns, related to a single-threaded regular-expression subsystem." }, { "lang": "es", "value": "Red Hat Directory Server 7.1 anteriores al SP7, Red Hat Directory Server 8, y Fedora Directory Server 1.1.1 permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de CPU y agotamiento de b\u00fasqueda) a trav\u00e9s de una petici\u00f3n de b\u00fasqueda LDAP manipulada con patrones, relativos a los subsistemas de hilo-simple y expresi\u00f3n-regular." } ], "id": "CVE-2008-2930", "lastModified": "2024-11-21T00:48:02.330", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-08-29T18:41:00.000", "references": [ { "source": "secalert@redhat.com", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "source": "secalert@redhat.com", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/31565" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/31627" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/31702" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/31867" }, { "source": "secalert@redhat.com", "url": "http://securitytracker.com/id?1020773" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2008-0602.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2008-0858.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/30871" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2008/2480" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454065" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44733" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6078" }, { "source": "secalert@redhat.com", "url": "https://rhn.redhat.com/errata/RHSA-2008-0596.html" }, { "source": "secalert@redhat.com", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00521.html" }, { "source": "secalert@redhat.com", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00708.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31565" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31627" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31702" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1020773" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0602.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0858.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/30871" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2480" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454065" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44733" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6078" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://rhn.redhat.com/errata/RHSA-2008-0596.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00521.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00708.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-04-16 18:05
Modified
2024-11-21 00:43
Severity ?
Summary
Red Hat Administration Server, as used by Red Hat Directory Server 8.0 EL4 and EL5, does not properly restrict access to CGI scripts, which allows remote attackers to perform administrative actions.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | directory_server | 8.0 | |
redhat | directory_server | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:directory_server:8.0:el4:*:*:*:*:*:*", "matchCriteriaId": "26DC5453-A850-4BC8-A9B2-272F9993FD6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:8.0:el5:*:*:*:*:*:*", "matchCriteriaId": "B06C0597-0694-4B0F-BD82-19E2C6B63095", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Red Hat Administration Server, as used by Red Hat Directory Server 8.0 EL4 and EL5, does not properly restrict access to CGI scripts, which allows remote attackers to perform administrative actions." }, { "lang": "es", "value": "Red Hat Administration Server, tal como se utiliza por Red Hat Directory Server 8.0 EL4 and EL5, no restringe el acceso correctamente a scripts CGI, lo cual permite a atacantes remotos llevar a cabo acciones administrativas." } ], "id": "CVE-2008-0893", "lastModified": "2024-11-21T00:43:09.907", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-04-16T18:05:00.000", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29761" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/29826" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0201.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/28802" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1019857" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=437320" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41843" }, { "source": "secalert@redhat.com", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00380.html" }, { "source": "secalert@redhat.com", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00386.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29761" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29826" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0201.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/28802" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019857" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=437320" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41843" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00380.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00386.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-23 19:00
Modified
2024-11-21 01:23
Severity ?
Summary
slapd (aka ns-slapd) in 389 Directory Server 1.2.7.5 (aka Red Hat Directory Server 8.2.x or dirsrv) does not properly handle simple paged result searches, which allows remote attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact via multiple search requests.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fedoraproject | 389_directory_server | 1.2.7.5 | |
redhat | directory_server | 8.2 | |
redhat | directory_server | 8.2.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "17C879AE-7435-43F5-94E5-A7ED84E46D0F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:directory_server:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "EDC61481-16C5-44EF-AA40-8423A40B2581", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C92B4226-6D3D-4430-A753-92E828FBBB8C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "slapd (aka ns-slapd) in 389 Directory Server 1.2.7.5 (aka Red Hat Directory Server 8.2.x or dirsrv) does not properly handle simple paged result searches, which allows remote attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact via multiple search requests." }, { "lang": "es", "value": "slapd (tambi\u00e9n conocido como ns-slapd) en 389 Directory Server v1.2.7.5 (tambi\u00e9n conocido como Red Hat Directory Server v8.2.x o dirsrv) no gestiona correctamente las consultas paginadas simples, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de demonio) o posiblemente tengan un impacto no especificado a trav\u00e9s de peticiones de b\u00fasqueda m\u00faltiples." } ], "id": "CVE-2011-0019", "lastModified": "2024-11-21T01:23:08.203", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-23T19:00:01.670", "references": [ { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2011-0293.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/46489" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1025102" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=666076" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=670914" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0293.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46489" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025102" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=666076" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=670914" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-08-21 14:55
Modified
2024-11-21 02:08
Severity ?
Summary
Red Hat Directory Server 8 and 389 Directory Server, when debugging is enabled, allows remote attackers to obtain sensitive replicated metadata by searching the directory.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "CE2E9C8D-FFEE-424C-BBA6-42BD4309D18A", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F2E9CEF-F30D-4374-A7E2-052102B602A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "16A8729B-B00B-4871-B083-6B10A5034721", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "6335FA65-9498-40AF-AE2B-034DA2823821", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "8CF92ADB-B5B0-43D7-93D8-CBA3AE46EB8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc2:*:*:*:*:*:*", "matchCriteriaId": "17F8ED59-E27A-4B9B-8BB8-66FAB2B2DCFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc3:*:*:*:*:*:*", "matchCriteriaId": "4200CEAB-4E14-48C8-9D6F-F86796475019", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc4:*:*:*:*:*:*", "matchCriteriaId": "3179916B-F98C-4D10-82AB-59DCCACBE8DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "B44B5289-08BB-4D62-B60D-1BD738472B1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a2:*:*:*:*:*:*", "matchCriteriaId": "02392BBF-AFAB-4739-BAF6-E930692AB28F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a3:*:*:*:*:*:*", "matchCriteriaId": "BFF70436-E01E-4912-AC31-B600F5E8CB4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a4:*:*:*:*:*:*", "matchCriteriaId": "360BA51B-B47E-4537-B564-9E628DF4E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "987F04BC-75DC-4959-AE32-070F11F9EBC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "078BCE55-90BB-48DE-92D1-9A152338158C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc3:*:*:*:*:*:*", "matchCriteriaId": "595F5AEE-E4A9-40E0-AF03-69AF689C4916", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc6:*:*:*:*:*:*", "matchCriteriaId": "FED47519-F254-4545-8551-FFBD0B4F9FAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc7:*:*:*:*:*:*", "matchCriteriaId": "A06C0421-74B7-4F9D-9F3A-18BF62BDD4D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "83F772DF-B8A7-4577-9AC6-3234B8C7FFAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.7:alpha3:*:*:*:*:*:*", "matchCriteriaId": "60624BFB-BB50-47F9-BB6D-BC92B40988BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "17C879AE-7435-43F5-94E5-A7ED84E46D0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha1:*:*:*:*:*:*", "matchCriteriaId": "5809DC7B-AC50-4E03-A8FA-6C2C6B67A400", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha2:*:*:*:*:*:*", "matchCriteriaId": "04FED7B7-7D97-4020-9D5C-A7150B43838C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha3:*:*:*:*:*:*", "matchCriteriaId": "6CA6BAB0-4638-4341-8835-E24E58855C37", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:rc1:*:*:*:*:*:*", "matchCriteriaId": "3C87A154-D750-4A93-B958-478CB17783F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:rc2:*:*:*:*:*:*", "matchCriteriaId": "762AF16D-D7C3-4444-B8E5-88626D7DCE6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2FF2BE2A-E90A-4336-864A-A76D9B1F0793", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "7EE57DD6-A59C-4073-8DBB-E8D667E9A206", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "5F65E0F9-731B-48E4-AF46-C8CAAE00820D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "B8AD8024-EF26-46B3-80E1-25661A5C538A", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "2B8B6754-F47D-4E51-BB5E-020B6546D906", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:alpha8:*:*:*:*:*:*", "matchCriteriaId": "A3DD52CC-C56A-4F62-BE61-BF826104B127", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:rc1:*:*:*:*:*:*", "matchCriteriaId": "D820510A-C85F-4F5D-895E-884DB70A409F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "5D661F57-BECB-4880-A14F-F9DB3C6659C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "1B6E8AC0-9017-4C68-BEA8-AC89642C74A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "9BFCE99E-C862-4A32-BFB1-799F835045AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DE676D-9EB2-4FBB-B9D8-AFF71345F92D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "CCBE4443-C736-4263-BC89-5A8F2ADD81E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "8D64150B-1D48-4966-873C-029747495BB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.6:*:*:*:*:*:*:*", "matchCriteriaId": "80F7CCAD-04B1-4BE1-BE61-791C5CA3984E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.8:*:*:*:*:*:*:*", "matchCriteriaId": "11943F1C-BD6D-4339-A381-5E4A33120383", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.9:*:*:*:*:*:*:*", "matchCriteriaId": "1BAA555B-4F2B-408D-9A4C-1740AFC228DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.10:*:*:*:*:*:*:*", "matchCriteriaId": "60E619C3-7E6D-4235-ACE5-67524CD38AA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.11:*:*:*:*:*:*:*", "matchCriteriaId": "8ED48D0E-1C9A-4FB8-B54E-F1B121D68045", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.12:*:*:*:*:*:*:*", "matchCriteriaId": "9A7DFDE6-7C1F-4AB2-8719-50B44D25620F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.13:*:*:*:*:*:*:*", "matchCriteriaId": "F102D5BD-8B5F-47BF-A94C-923F0BEE943E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.14:*:*:*:*:*:*:*", "matchCriteriaId": "912A37B4-1E3B-40AB-8B63-720F84365843", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.15:*:*:*:*:*:*:*", "matchCriteriaId": "16C83007-E3C8-40D0-ADAE-E7EE87CCA464", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.17:*:*:*:*:*:*:*", "matchCriteriaId": "608BF64E-4204-4610-B23C-BC206E870F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.19:*:*:*:*:*:*:*", "matchCriteriaId": "10315DCC-28D6-400C-92C1-C0AD5E3DDF53", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.20:*:*:*:*:*:*:*", "matchCriteriaId": "8FE13693-1A6B-4A2A-AF64-F76FA0A3EBA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.21:*:*:*:*:*:*:*", "matchCriteriaId": "83A5B6F2-DCD1-49D4-92FC-303A960542C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.22:*:*:*:*:*:*:*", "matchCriteriaId": "304EAF1A-3163-4184-B3FC-0B641BA1FC03", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.23:*:*:*:*:*:*:*", "matchCriteriaId": "49F8893E-7087-4874-9D39-6238317CB6B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.25:*:*:*:*:*:*:*", "matchCriteriaId": "2145BE75-1513-47D5-865A-C56D5A93541C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.26:*:*:*:*:*:*:*", "matchCriteriaId": "0C9144FC-CAA0-4433-A096-E42A1C3B2A0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C7B3AF4-72F4-4242-84A5-1C5096BB42B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "22BA10F4-510E-4D25-9DA6-BC475EEA5F12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3766F68E-448D-4298-B0CE-1A37497984DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "70105BE3-6F4F-41FB-9CAB-8990A4FAC475", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "028A3ADC-1C62-4233-8FE6-C54B65C6855D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "513E1F97-C0C8-49D7-8CC0-5CD6D258A956", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "CDF2940A-5375-4EB0-87B0-9DC3467DE5E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E190C97-A279-4EEE-B9C4-1EA888920F80", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Red Hat Directory Server 8 and 389 Directory Server, when debugging is enabled, allows remote attackers to obtain sensitive replicated metadata by searching the directory." }, { "lang": "es", "value": "Red Hat Directory Server 8 y 389 Directory Server, cuando depuraci\u00f3n est\u00e1 habilitada, permite a atacantes remotos obtener metadatos replicados sensibles mediante la b\u00fasqueda del directorio." } ], "id": "CVE-2014-3562", "lastModified": "2024-11-21T02:08:22.607", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-08-21T14:55:04.993", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1031.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1032.html" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1123477" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1031.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1032.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1123477" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-08-29 18:41
Modified
2024-11-21 00:48
Severity ?
Summary
Multiple buffer overflows in the adminutil library in CGI applications in Red Hat Directory Server 7.1 before SP7 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted Accept-Language HTTP header.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | directory_server | 7.1 | |
redhat | directory_server | 7.1 | |
redhat | directory_server | 7.1 | |
redhat | directory_server | 7.1 | |
redhat | directory_server | 7.1 | |
redhat | directory_server | 7.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "2060B92C-72E4-4FAF-9CB6-C6142F6DDE7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "7A7C6A16-F928-4682-BCCA-D004FB4781B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "374634C4-D913-46B3-AB98-1E3573814E5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "B58F8C3A-C0F5-400A-823F-F92F71B385EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp5:*:*:*:*:*:*", "matchCriteriaId": "1F47246B-7393-4F61-88F5-2B8A2211C46F", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp6:*:*:*:*:*:*", "matchCriteriaId": "325755C1-03E1-4947-A5A0-9FEBB0DC4E89", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in the adminutil library in CGI applications in Red Hat Directory Server 7.1 before SP7 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted Accept-Language HTTP header." }, { "lang": "es", "value": "M\u00faltiples desbordamiento de b\u00fafer en la biblioteca adminutil de aplicaciones CGI en Red Hat Directory Server 7.1 anteriores a SP7, permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de demonio) o posiblemente ejecuci\u00f3n arbitraria de c\u00f3digo a trav\u00e9s de una cabecera http Accept languaje manipulada." } ], "id": "CVE-2008-2928", "lastModified": "2024-11-21T00:48:02.053", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-08-29T18:41:00.000", "references": [ { "source": "secalert@redhat.com", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "source": "secalert@redhat.com", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/31565" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/31702" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/31777" }, { "source": "secalert@redhat.com", "url": "http://securitytracker.com/id?1020771" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/30869" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2008/2480" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453916" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44738" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5865" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://rhn.redhat.com/errata/RHSA-2008-0596.html" }, { "source": "secalert@redhat.com", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00218.html" }, { "source": "secalert@redhat.com", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00449.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31565" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31702" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31777" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1020771" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/30869" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2480" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453916" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44738" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5865" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://rhn.redhat.com/errata/RHSA-2008-0596.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00218.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00449.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-05-12 16:20
Modified
2024-11-21 00:45
Severity ?
Summary
Buffer overflow in the regular expression handler in Red Hat Directory Server 8.0 and 7.1 before SP6 allows remote attackers to cause a denial of service (slapd crash) and possibly execute arbitrary code via a crafted LDAP query that triggers the overflow during translation to a regular expression.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | directory_server | 7.1 | |
redhat | directory_server | 7.1 | |
redhat | directory_server | 7.1 | |
redhat | directory_server | 7.1 | |
redhat | directory_server | 7.1 | |
redhat | directory_server | 8.0 | |
redhat | fedora_directory_server | 1.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "2060B92C-72E4-4FAF-9CB6-C6142F6DDE7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "7A7C6A16-F928-4682-BCCA-D004FB4781B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "374634C4-D913-46B3-AB98-1E3573814E5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "B58F8C3A-C0F5-400A-823F-F92F71B385EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp5:*:*:*:*:*:*", "matchCriteriaId": "1F47246B-7393-4F61-88F5-2B8A2211C46F", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E190C97-A279-4EEE-B9C4-1EA888920F80", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:fedora_directory_server:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "673085C4-1098-45FB-9A8B-82ABC0771800", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the regular expression handler in Red Hat Directory Server 8.0 and 7.1 before SP6 allows remote attackers to cause a denial of service (slapd crash) and possibly execute arbitrary code via a crafted LDAP query that triggers the overflow during translation to a regular expression." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en el controlador de expresiones regulares de Red Hat Directory Server 8.0 y 7.1 anterior a SP6 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de slapd) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante una consulta LDAP manipulada que dispara el desbordamiento durante la traducci\u00f3n a una expresi\u00f3n regular." } ], "id": "CVE-2008-1677", "lastModified": "2024-11-21T00:45:04.513", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-05-12T16:20:00.000", "references": [ { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/30181" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/30185" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0268.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0269.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/29126" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1020001" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=444712" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42332" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/30181" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/30185" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0268.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0269.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/29126" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1020001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=444712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42332" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-07-03 16:40
Modified
2024-11-21 01:39
Severity ?
Summary
389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), after the password for a LDAP user has been changed and before the server has been reset, allows remote attackers to read the plaintext password via the unhashed#user#password attribute.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:directory_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5481052-D318-4F67-9567-79157BC716D0", "versionEndIncluding": "8.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "ABADB3F7-AD65-4E62-BEA5-782539911B6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E190C97-A279-4EEE-B9C4-1EA888920F80", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2D75336B-F1E7-4369-B11D-1B132CA45424", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C3A4C9B-3A48-4B84-9B54-7972E9F21566", "versionEndIncluding": "1.2.11.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "CE2E9C8D-FFEE-424C-BBA6-42BD4309D18A", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F2E9CEF-F30D-4374-A7E2-052102B602A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "16A8729B-B00B-4871-B083-6B10A5034721", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "6335FA65-9498-40AF-AE2B-034DA2823821", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "8CF92ADB-B5B0-43D7-93D8-CBA3AE46EB8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc2:*:*:*:*:*:*", "matchCriteriaId": "17F8ED59-E27A-4B9B-8BB8-66FAB2B2DCFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc3:*:*:*:*:*:*", "matchCriteriaId": "4200CEAB-4E14-48C8-9D6F-F86796475019", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc4:*:*:*:*:*:*", "matchCriteriaId": "3179916B-F98C-4D10-82AB-59DCCACBE8DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "B44B5289-08BB-4D62-B60D-1BD738472B1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a2:*:*:*:*:*:*", "matchCriteriaId": "02392BBF-AFAB-4739-BAF6-E930692AB28F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a3:*:*:*:*:*:*", "matchCriteriaId": "BFF70436-E01E-4912-AC31-B600F5E8CB4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a4:*:*:*:*:*:*", "matchCriteriaId": "360BA51B-B47E-4537-B564-9E628DF4E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "987F04BC-75DC-4959-AE32-070F11F9EBC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "078BCE55-90BB-48DE-92D1-9A152338158C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc3:*:*:*:*:*:*", "matchCriteriaId": "595F5AEE-E4A9-40E0-AF03-69AF689C4916", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc6:*:*:*:*:*:*", "matchCriteriaId": "FED47519-F254-4545-8551-FFBD0B4F9FAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc7:*:*:*:*:*:*", "matchCriteriaId": "A06C0421-74B7-4F9D-9F3A-18BF62BDD4D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "83F772DF-B8A7-4577-9AC6-3234B8C7FFAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.7:alpha3:*:*:*:*:*:*", "matchCriteriaId": "60624BFB-BB50-47F9-BB6D-BC92B40988BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "17C879AE-7435-43F5-94E5-A7ED84E46D0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha1:*:*:*:*:*:*", "matchCriteriaId": "5809DC7B-AC50-4E03-A8FA-6C2C6B67A400", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha2:*:*:*:*:*:*", "matchCriteriaId": "04FED7B7-7D97-4020-9D5C-A7150B43838C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha3:*:*:*:*:*:*", "matchCriteriaId": "6CA6BAB0-4638-4341-8835-E24E58855C37", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:rc1:*:*:*:*:*:*", "matchCriteriaId": "3C87A154-D750-4A93-B958-478CB17783F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:rc2:*:*:*:*:*:*", "matchCriteriaId": "762AF16D-D7C3-4444-B8E5-88626D7DCE6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2FF2BE2A-E90A-4336-864A-A76D9B1F0793", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "7EE57DD6-A59C-4073-8DBB-E8D667E9A206", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "5F65E0F9-731B-48E4-AF46-C8CAAE00820D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "B8AD8024-EF26-46B3-80E1-25661A5C538A", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:alpha8:*:*:*:*:*:*", "matchCriteriaId": "A3DD52CC-C56A-4F62-BE61-BF826104B127", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:rc1:*:*:*:*:*:*", "matchCriteriaId": "D820510A-C85F-4F5D-895E-884DB70A409F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "E6CA2089-F7DF-418B-BFAC-AACA7784EB03", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "5D661F57-BECB-4880-A14F-F9DB3C6659C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "1B6E8AC0-9017-4C68-BEA8-AC89642C74A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "9BFCE99E-C862-4A32-BFB1-799F835045AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.7:*:*:*:*:*:*:*", "matchCriteriaId": "49A97D83-D0D8-4596-BEA0-825B13B60ADB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "CCBE4443-C736-4263-BC89-5A8F2ADD81E7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), after the password for a LDAP user has been changed and before the server has been reset, allows remote attackers to read the plaintext password via the unhashed#user#password attribute." }, { "lang": "es", "value": "\"389 Directory Server\" antes de v1.2.11.6 (tambi\u00e9n conocido como Red Hat Directory Server antes de v8.2.10-3), cuando la contrase\u00f1a de un usuario de LDAP ha cambiado y anyes de que el servidor haya sido reiniciado, permite a atacantes remotos leer contrase\u00f1as en claro a trav\u00e9s del atributo unhashed#user#password." } ], "id": "CVE-2012-2678", "lastModified": "2024-11-21T01:39:25.777", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.2, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-07-03T16:40:33.583", "references": [ { "source": "secalert@redhat.com", "url": "http://directory.fedoraproject.org/wiki/Release_Notes" }, { "source": "secalert@redhat.com", "url": "http://osvdb.org/83336" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0997.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1041.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49734" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/54153" }, { "source": "secalert@redhat.com", "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083" }, { "source": "secalert@redhat.com", "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19353" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://directory.fedoraproject.org/wiki/Release_Notes" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/83336" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0997.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1041.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49734" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/54153" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19353" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-06-02 14:15
Modified
2024-12-13 18:47
Severity ?
Summary
An access control bypass vulnerability found in 389-ds-base. That mishandling of the filter that would yield incorrect results, but as that has progressed, can be determined that it actually is an access control bypass. This may allow any remote unauthenticated user to issue a filter that allows searching for database items they do not have access to, including but not limited to potentially userPassword hashes and other sensitive data.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2091781 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=2091781 | Issue Tracking, Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | 389_directory_server | * | |
redhat | directory_server | 11.0 | |
redhat | directory_server | 12.0 | |
redhat | enterprise_linux | 8.0 | |
redhat | enterprise_linux | 9.0 | |
fedoraproject | fedora | 34 | |
fedoraproject | fedora | 35 | |
fedoraproject | fedora | 36 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:389_directory_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6C73360-00B0-4F00-9985-2498BDB2749C", "versionEndIncluding": "2.0.0", "versionStartIncluding": "1.3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:directory_server:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "2A169F6D-88A5-4631-9D30-519350ACFE6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "A3DAF61A-58A9-41A6-A4DC-64148055B0C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An access control bypass vulnerability found in 389-ds-base. That mishandling of the filter that would yield incorrect results, but as that has progressed, can be determined that it actually is an access control bypass. This may allow any remote unauthenticated user to issue a filter that allows searching for database items they do not have access to, including but not limited to potentially userPassword hashes and other sensitive data." }, { "lang": "es", "value": "Una vulnerabilidad de omisi\u00f3n de control de acceso encontrada en 389-ds-base. Ese manejo inapropiado del filtro que dar\u00eda resultados incorrectos, pero a medida que ha avanzado, puede determinarse que en realidad es una omisi\u00f3n de control de acceso. Esto puede permitir a cualquier usuario remoto no autenticado emitir un filtro que permita buscar elementos de la base de datos a los que no presenta acceso, incluyendo pero no limit\u00e1ndose a los hashes de userPassword y otros datos confidenciales" } ], "id": "CVE-2022-1949", "lastModified": "2024-12-13T18:47:19.243", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-06-02T14:15:34.257", "references": [ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091781" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091781" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-639" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-03-12 00:44
Modified
2024-11-21 00:43
Severity ?
Summary
Red Hat Directory Server 7.1 before SP4 uses insecure permissions for certain directories, which allows local users to modify JAR files and execute arbitrary code via unknown vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | directory_server | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:directory_server:*:sp3:*:*:*:*:*:*", "matchCriteriaId": "70B1EBD6-ACA5-41E7-B1C8-BA8D13F44E82", "versionEndIncluding": "7.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Red Hat Directory Server 7.1 before SP4 uses insecure permissions for certain directories, which allows local users to modify JAR files and execute arbitrary code via unknown vectors." }, { "lang": "es", "value": "Red Hat Directory Server 7.1 anterior al SP4 usa permisos inseguros para ciertos directorios, lo que permite a usuarios locales modificar archivos JAR y ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores no especificados." } ], "id": "CVE-2008-0890", "lastModified": "2024-11-21T00:43:09.517", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-03-12T00:44:00.000", "references": [ { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/29350" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2008-0173.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/28204" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1019577" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41152" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29350" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0173.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/28204" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019577" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41152" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-02-27 22:15
Modified
2024-11-21 07:38
Severity ?
Summary
A flaw was found in RHDS 11 and RHDS 12. While browsing entries LDAP tries to decode the userPassword attribute instead of the userCertificate attribute which could lead into sensitive information leaked. An attacker with a local account where the cockpit-389-ds is running can list the processes and display the hashed passwords. The highest threat from this vulnerability is to data confidentiality.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | directory_server | 11.5 | |
redhat | directory_server | 11.6 | |
redhat | directory_server | 12.0 | |
redhat | directory_server | 12.1 | |
fedoraproject | fedora | 36 | |
fedoraproject | fedora | 37 | |
fedoraproject | fedora | 38 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:directory_server:11.5:*:*:*:*:*:*:*", "matchCriteriaId": "5532B7A4-A873-4639-B8D4-B6A65CFCFB3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:11.6:*:*:*:*:*:*:*", "matchCriteriaId": "151CA15F-B090-4767-A1B0-03CBE45A7B75", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "A3DAF61A-58A9-41A6-A4DC-64148055B0C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "F8C6D6E7-66A9-4F10-B38D-5D6832CD4D77", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in RHDS 11 and RHDS 12. While browsing entries LDAP tries to decode the userPassword attribute instead of the userCertificate attribute which could lead into sensitive information leaked. An attacker with a local account where the cockpit-389-ds is running can list the processes and display the hashed passwords. The highest threat from this vulnerability is to data confidentiality." } ], "id": "CVE-2023-1055", "lastModified": "2024-11-21T07:38:22.297", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-02-27T22:15:09.990", "references": [ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173517#c0" }, { "source": "secalert@redhat.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZOYQ5TCV6ZEPMDV4CSLK3KINAAO4SRI/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173517#c0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZOYQ5TCV6ZEPMDV4CSLK3KINAAO4SRI/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-03-26 17:15
Modified
2024-11-21 05:27
Severity ?
Summary
When binding against a DN during authentication, the reply from 389-ds-base will be different whether the DN exists or not. This can be used by an unauthenticated attacker to check the existence of an entry in the LDAP database.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | 389_directory_server | * | |
redhat | 389_directory_server | * | |
redhat | 389_directory_server | * | |
redhat | directory_server | 11.0 | |
redhat | enterprise_linux | 7.0 | |
redhat | enterprise_linux | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:389_directory_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "826F6485-30A1-49A6-8E66-4F53DAD03EDE", "versionEndExcluding": "1.4.3.19", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:389_directory_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "7273B979-C446-45CA-A601-9F81F6DA503C", "versionEndExcluding": "1.4.4.13", "versionStartIncluding": "1.4.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:389_directory_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "72D21DC8-ED0C-4C96-A9CF-0EE1E3EBD7F9", "versionEndExcluding": "2.0.3", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:directory_server:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "2A169F6D-88A5-4631-9D30-519350ACFE6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "When binding against a DN during authentication, the reply from 389-ds-base will be different whether the DN exists or not. This can be used by an unauthenticated attacker to check the existence of an entry in the LDAP database." }, { "lang": "es", "value": "Cuando se vincula con un DN durante la autenticaci\u00f3n, la respuesta de 389-ds-base ser\u00e1 diferente si el DN se presenta o no. Esto puede ser usado por un atacante no autenticado para comprobar la existencia de una entrada en la base de datos de LDAP." } ], "id": "CVE-2020-35518", "lastModified": "2024-11-21T05:27:28.920", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-03-26T17:15:12.280", "references": [ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905565" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/389ds/389-ds-base/commit/b6aae4d8e7c8a6ddd21646f94fef1bf7f22c3f32" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/389ds/389-ds-base/commit/cc0f69283abc082488824702dae485b8eae938bc" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/389ds/389-ds-base/issues/4480" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905565" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/389ds/389-ds-base/commit/b6aae4d8e7c8a6ddd21646f94fef1bf7f22c3f32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/389ds/389-ds-base/commit/cc0f69283abc082488824702dae485b8eae938bc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/389ds/389-ds-base/issues/4480" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-203" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-17 20:00
Modified
2024-11-21 01:16
Severity ?
Summary
The (1) setup-ds.pl and (2) setup-ds-admin.pl setup scripts for Red Hat Directory Server 8 before 8.2 use world-readable permissions when creating cache files, which allows local users to obtain sensitive information including passwords for Directory and Administration Server administrative accounts.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | directory_server | 8.0 | |
redhat | directory_server | 8.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:directory_server:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E190C97-A279-4EEE-B9C4-1EA888920F80", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2D75336B-F1E7-4369-B11D-1B132CA45424", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The (1) setup-ds.pl and (2) setup-ds-admin.pl setup scripts for Red Hat Directory Server 8 before 8.2 use world-readable permissions when creating cache files, which allows local users to obtain sensitive information including passwords for Directory and Administration Server administrative accounts." }, { "lang": "es", "value": "Los scripts de configuraci\u00f3n (1) setup-ds.pl y (2) setup-ds-admin.pl para Red Hat Directory Server v8 anterior a v8.2 usa permisos de lectura para todos \"world-readable\" cuando crea ficheros de cache, lo cual permite a usuarios locales obtener informaci\u00f3n sensible incluyendo contrase\u00f1as de cuentas administrativas de Directory y Administration Server." } ], "id": "CVE-2010-2241", "lastModified": "2024-11-21T01:16:13.303", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-08-17T20:00:03.597", "references": [ { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2010-0590.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40811" }, { "source": "secalert@redhat.com", "url": "http://www.osvdb.org/66962" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1024281" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=608032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2010-0590.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/66962" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024281" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=608032" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-08-29 18:41
Modified
2024-11-21 00:48
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the adminutil library in the Directory Server Administration Express and Directory Server Gateway (DSGW) web interface in Red Hat Directory Server 7.1 before SP7 and 8 EL4 and EL5, and Fedora Directory Server, allow remote attackers to inject arbitrary web script or HTML via input values that use % (percent) escaping.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fedora | directory_server | * | |
redhat | directory_server | 7.1 | |
redhat | directory_server | 7.1 | |
redhat | directory_server | 7.1 | |
redhat | directory_server | 7.1 | |
redhat | directory_server | 7.1 | |
redhat | directory_server | 7.1 | |
redhat | directory_server | 8.0 | |
redhat | directory_server | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fedora:directory_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "325FCDFC-22D9-447B-9B56-D65A09F780A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "2060B92C-72E4-4FAF-9CB6-C6142F6DDE7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "7A7C6A16-F928-4682-BCCA-D004FB4781B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "374634C4-D913-46B3-AB98-1E3573814E5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "B58F8C3A-C0F5-400A-823F-F92F71B385EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp5:*:*:*:*:*:*", "matchCriteriaId": "1F47246B-7393-4F61-88F5-2B8A2211C46F", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp6:*:*:*:*:*:*", "matchCriteriaId": "325755C1-03E1-4947-A5A0-9FEBB0DC4E89", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:8.0:el4:*:*:*:*:*:*", "matchCriteriaId": "26DC5453-A850-4BC8-A9B2-272F9993FD6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:8.0:el5:*:*:*:*:*:*", "matchCriteriaId": "B06C0597-0694-4B0F-BD82-19E2C6B63095", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the adminutil library in the Directory Server Administration Express and Directory Server Gateway (DSGW) web interface in Red Hat Directory Server 7.1 before SP7 and 8 EL4 and EL5, and Fedora Directory Server, allow remote attackers to inject arbitrary web script or HTML via input values that use % (percent) escaping." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en la biblioteca adminutil del interface web de Directory Server Administration Express y Directory Server Gateway (DSGW) en Red Hat Directory Server 7.1 anteriores al SP7 y 8 EL4 y EL5, y Fedora Directory Server, permite a atacantes remotos inyectar web script o HTML de su elecci\u00f3n a trav\u00e9s de valores de entrada que utilizan el car\u00e1cter de escape %." } ], "id": "CVE-2008-2929", "lastModified": "2024-11-21T00:48:02.163", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-08-29T18:41:00.000", "references": [ { "source": "secalert@redhat.com", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "source": "secalert@redhat.com", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/31565" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/31612" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/31702" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/31777" }, { "source": "secalert@redhat.com", "url": "http://securitytracker.com/id?1020772" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/30870" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2008/2480" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454621" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44737" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5877" }, { "source": "secalert@redhat.com", "url": "https://rhn.redhat.com/errata/RHSA-2008-0596.html" }, { "source": "secalert@redhat.com", "url": "https://rhn.redhat.com/errata/RHSA-2008-0601.html" }, { "source": "secalert@redhat.com", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00218.html" }, { "source": "secalert@redhat.com", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00449.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31565" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31612" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31702" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31777" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1020772" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/30870" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2480" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454621" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44737" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5877" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://rhn.redhat.com/errata/RHSA-2008-0596.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://rhn.redhat.com/errata/RHSA-2008-0601.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00218.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00449.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-07-03 16:40
Modified
2024-11-21 01:39
Severity ?
Summary
389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), when the password of a LDAP user has been changed and audit logging is enabled, saves the new password to the log in plain text, which allows remote authenticated users to read the password.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:directory_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5481052-D318-4F67-9567-79157BC716D0", "versionEndIncluding": "8.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "ABADB3F7-AD65-4E62-BEA5-782539911B6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E190C97-A279-4EEE-B9C4-1EA888920F80", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2D75336B-F1E7-4369-B11D-1B132CA45424", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C3A4C9B-3A48-4B84-9B54-7972E9F21566", "versionEndIncluding": "1.2.11.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "CE2E9C8D-FFEE-424C-BBA6-42BD4309D18A", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F2E9CEF-F30D-4374-A7E2-052102B602A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "16A8729B-B00B-4871-B083-6B10A5034721", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "6335FA65-9498-40AF-AE2B-034DA2823821", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "8CF92ADB-B5B0-43D7-93D8-CBA3AE46EB8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc2:*:*:*:*:*:*", "matchCriteriaId": "17F8ED59-E27A-4B9B-8BB8-66FAB2B2DCFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc3:*:*:*:*:*:*", "matchCriteriaId": "4200CEAB-4E14-48C8-9D6F-F86796475019", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc4:*:*:*:*:*:*", "matchCriteriaId": "3179916B-F98C-4D10-82AB-59DCCACBE8DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "B44B5289-08BB-4D62-B60D-1BD738472B1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a2:*:*:*:*:*:*", "matchCriteriaId": "02392BBF-AFAB-4739-BAF6-E930692AB28F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a3:*:*:*:*:*:*", "matchCriteriaId": "BFF70436-E01E-4912-AC31-B600F5E8CB4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a4:*:*:*:*:*:*", "matchCriteriaId": "360BA51B-B47E-4537-B564-9E628DF4E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "987F04BC-75DC-4959-AE32-070F11F9EBC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "078BCE55-90BB-48DE-92D1-9A152338158C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc3:*:*:*:*:*:*", "matchCriteriaId": "595F5AEE-E4A9-40E0-AF03-69AF689C4916", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc6:*:*:*:*:*:*", "matchCriteriaId": "FED47519-F254-4545-8551-FFBD0B4F9FAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc7:*:*:*:*:*:*", "matchCriteriaId": "A06C0421-74B7-4F9D-9F3A-18BF62BDD4D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "83F772DF-B8A7-4577-9AC6-3234B8C7FFAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.7:alpha3:*:*:*:*:*:*", "matchCriteriaId": "60624BFB-BB50-47F9-BB6D-BC92B40988BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "17C879AE-7435-43F5-94E5-A7ED84E46D0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha1:*:*:*:*:*:*", "matchCriteriaId": "5809DC7B-AC50-4E03-A8FA-6C2C6B67A400", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha2:*:*:*:*:*:*", "matchCriteriaId": "04FED7B7-7D97-4020-9D5C-A7150B43838C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha3:*:*:*:*:*:*", "matchCriteriaId": "6CA6BAB0-4638-4341-8835-E24E58855C37", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:rc1:*:*:*:*:*:*", "matchCriteriaId": "3C87A154-D750-4A93-B958-478CB17783F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:rc2:*:*:*:*:*:*", "matchCriteriaId": "762AF16D-D7C3-4444-B8E5-88626D7DCE6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2FF2BE2A-E90A-4336-864A-A76D9B1F0793", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "7EE57DD6-A59C-4073-8DBB-E8D667E9A206", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "5F65E0F9-731B-48E4-AF46-C8CAAE00820D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "B8AD8024-EF26-46B3-80E1-25661A5C538A", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:alpha8:*:*:*:*:*:*", "matchCriteriaId": "A3DD52CC-C56A-4F62-BE61-BF826104B127", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:rc1:*:*:*:*:*:*", "matchCriteriaId": "D820510A-C85F-4F5D-895E-884DB70A409F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "E6CA2089-F7DF-418B-BFAC-AACA7784EB03", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "5D661F57-BECB-4880-A14F-F9DB3C6659C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "1B6E8AC0-9017-4C68-BEA8-AC89642C74A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "9BFCE99E-C862-4A32-BFB1-799F835045AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.7:*:*:*:*:*:*:*", "matchCriteriaId": "49A97D83-D0D8-4596-BEA0-825B13B60ADB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "CCBE4443-C736-4263-BC89-5A8F2ADD81E7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), when the password of a LDAP user has been changed and audit logging is enabled, saves the new password to the log in plain text, which allows remote authenticated users to read the password." }, { "lang": "es", "value": "\"389 Directory Server\" antes de v1.2.11.6 (tambi\u00e9n conocido como Red Hat Directory Server antes de v8.2.10-3), cuando la contrase\u00f1a de un usuario de LDAP ha cambiado y el registro de auditor\u00eda est\u00e1 habilitada, guarda la nueva contrase\u00f1a para el registro en texto plano, lo que permite leer la contrase\u00f1a a usuarios remotos autenticados." } ], "id": "CVE-2012-2746", "lastModified": "2024-11-21T01:39:33.607", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-07-03T16:40:34.537", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://directory.fedoraproject.org/wiki/Release_Notes" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0997.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1041.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49734" }, { "source": "secalert@redhat.com", "url": "http://www.osvdb.org/83329" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/54153" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833482" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76595" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://fedorahosted.org/389/ticket/365" }, { "source": "secalert@redhat.com", "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083" }, { "source": "secalert@redhat.com", "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19241" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://directory.fedoraproject.org/wiki/Release_Notes" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0997.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1041.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49734" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/83329" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/54153" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833482" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76595" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://fedorahosted.org/389/ticket/365" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19241" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-11-23 11:55
Modified
2024-11-21 01:55
Severity ?
Summary
389 Directory Server 1.2.11.15 (aka Red Hat Directory Server before 8.2.11-14) allows remote authenticated users to cause a denial of service (crash) via multiple @ characters in a GER attribute list in a search request.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | enterprise_linux | 6.0 | |
fedoraproject | 389_directory_server | 1.2.11.15 | |
redhat | directory_server | * | |
redhat | directory_server | 7.1 | |
redhat | directory_server | 8.0 | |
redhat | directory_server | 8.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.15:*:*:*:*:*:*:*", "matchCriteriaId": "16C83007-E3C8-40D0-ADAE-E7EE87CCA464", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5481052-D318-4F67-9567-79157BC716D0", "versionEndIncluding": "8.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "ABADB3F7-AD65-4E62-BEA5-782539911B6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E190C97-A279-4EEE-B9C4-1EA888920F80", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2D75336B-F1E7-4369-B11D-1B132CA45424", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "389 Directory Server 1.2.11.15 (aka Red Hat Directory Server before 8.2.11-14) allows remote authenticated users to cause a denial of service (crash) via multiple @ characters in a GER attribute list in a search request." }, { "lang": "es", "value": "389 Directory Server 1.2.11.15 (tambi\u00e9n conocido como Red Hat Directory Server anterior a la versi\u00f3n 8.2.11-14) permite a usuarios remotos autenticados provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de m\u00faltiples caracteres @ en una lista de atributo GER de una petici\u00f3n de b\u00fasqueda." } ], "id": "CVE-2013-4485", "lastModified": "2024-11-21T01:55:39.853", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-11-23T11:55:04.710", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1752.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1753.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/55765" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1752.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1753.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/55765" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-08-29 18:41
Modified
2024-11-21 00:48
Severity ?
Summary
Multiple memory leaks in Red Hat Directory Server 7.1 before SP7, Red Hat Directory Server 8, and Fedora Directory Server 1.1.1 and earlier allow remote attackers to cause a denial of service (memory consumption) via vectors involving (1) the authentication / bind phase and (2) anonymous LDAP search requests.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fedora | directory_server | 1.1.1 | |
redhat | directory_server | 7.1 | |
redhat | directory_server | 7.1 | |
redhat | directory_server | 7.1 | |
redhat | directory_server | 7.1 | |
redhat | directory_server | 7.1 | |
redhat | directory_server | 7.1 | |
redhat | directory_server | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fedora:directory_server:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "662D91E0-D891-4B30-B4D1-FA7FFACBF148", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "2060B92C-72E4-4FAF-9CB6-C6142F6DDE7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "7A7C6A16-F928-4682-BCCA-D004FB4781B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "374634C4-D913-46B3-AB98-1E3573814E5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "B58F8C3A-C0F5-400A-823F-F92F71B385EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp5:*:*:*:*:*:*", "matchCriteriaId": "1F47246B-7393-4F61-88F5-2B8A2211C46F", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:sp6:*:*:*:*:*:*", "matchCriteriaId": "325755C1-03E1-4947-A5A0-9FEBB0DC4E89", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E190C97-A279-4EEE-B9C4-1EA888920F80", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple memory leaks in Red Hat Directory Server 7.1 before SP7, Red Hat Directory Server 8, and Fedora Directory Server 1.1.1 and earlier allow remote attackers to cause a denial of service (memory consumption) via vectors involving (1) the authentication / bind phase and (2) anonymous LDAP search requests." }, { "lang": "es", "value": "M\u00faltiples fugas de memoria en Red Hat Directory Server 7.1 anteriores al SP7, Red Hat Directory Server 8, y Fedora Directory Server 1.1.1 y anteriores, permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de memoria) a trav\u00e9s de vectores que involucran: (1) la fase de autenticaci\u00f3n/asignaci\u00f3n y (2) peticiones de b\u00fasqueda LDAP an\u00f3nimas.\r\n\r\n" } ], "id": "CVE-2008-3283", "lastModified": "2024-11-21T00:48:52.943", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-08-29T18:41:00.000", "references": [ { "source": "secalert@redhat.com", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "source": "secalert@redhat.com", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/31565" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/31627" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/31702" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/31867" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/31913" }, { "source": "secalert@redhat.com", "url": "http://securitytracker.com/id?1020774" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2008-0602.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2008-0858.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/30872" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2008/2480" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=458977" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44731" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6118" }, { "source": "secalert@redhat.com", "url": "https://rhn.redhat.com/errata/RHSA-2008-0596.html" }, { "source": "secalert@redhat.com", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00521.html" }, { "source": "secalert@redhat.com", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00708.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31565" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31627" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31702" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31913" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1020774" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0602.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0858.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/30872" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2480" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=458977" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44731" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://rhn.redhat.com/errata/RHSA-2008-0596.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00521.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00708.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-03-20 00:44
Modified
2024-11-21 00:43
Severity ?
Summary
Red Hat Directory Server 8.0, when running on Red Hat Enterprise Linux, uses insecure permissions for the redhat-idm-console script, which allows local users to execute arbitrary code by modifying the script.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | enterprise_linux | * | |
redhat | directory_server | 8.0 | |
redhat | directory_server | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:*:*:*:*:*:*:*:*", "matchCriteriaId": "4CECD221-9715-4ECD-88E5-3252EFCA784F", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:directory_server:8.0:el4:*:*:*:*:*:*", "matchCriteriaId": "26DC5453-A850-4BC8-A9B2-272F9993FD6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:8.0:el5:*:*:*:*:*:*", "matchCriteriaId": "B06C0597-0694-4B0F-BD82-19E2C6B63095", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Red Hat Directory Server 8.0, when running on Red Hat Enterprise Linux, uses insecure permissions for the redhat-idm-console script, which allows local users to execute arbitrary code by modifying the script." }, { "lang": "es", "value": "Red Hat Directory Server 8.0, ejecutado en Red Hat Enterprise Linux, usa permisos no seguros para la secuencia de comandos redhat-idm-console lo que permite a usuarios locales ejecutar c\u00f3digo de su elecci\u00f3n mediante la modificaci\u00f3n de la secuencia de comandos." } ], "id": "CVE-2008-0889", "lastModified": "2024-11-21T00:43:09.400", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-03-20T00:44:00.000", "references": [ { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/29482" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0191.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/28327" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1019677" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29482" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0191.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/28327" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019677" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-23 19:00
Modified
2024-11-21 01:24
Severity ?
Summary
The (1) backup and restore scripts, (2) main initialization script, and (3) ldap-agent script in 389 Directory Server 1.2.x (aka Red Hat Directory Server 8.2.x) place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fedoraproject | 389_directory_server | 1.2.1 | |
fedoraproject | 389_directory_server | 1.2.2 | |
fedoraproject | 389_directory_server | 1.2.3 | |
fedoraproject | 389_directory_server | 1.2.5 | |
fedoraproject | 389_directory_server | 1.2.5 | |
fedoraproject | 389_directory_server | 1.2.5 | |
fedoraproject | 389_directory_server | 1.2.5 | |
fedoraproject | 389_directory_server | 1.2.5 | |
fedoraproject | 389_directory_server | 1.2.6 | |
fedoraproject | 389_directory_server | 1.2.6 | |
fedoraproject | 389_directory_server | 1.2.6 | |
fedoraproject | 389_directory_server | 1.2.6 | |
fedoraproject | 389_directory_server | 1.2.6 | |
fedoraproject | 389_directory_server | 1.2.6 | |
fedoraproject | 389_directory_server | 1.2.6 | |
fedoraproject | 389_directory_server | 1.2.6 | |
fedoraproject | 389_directory_server | 1.2.6 | |
fedoraproject | 389_directory_server | 1.2.6.1 | |
fedoraproject | 389_directory_server | 1.2.7 | |
fedoraproject | 389_directory_server | 1.2.7.5 | |
fedoraproject | 389_directory_server | 1.2.8 | |
fedoraproject | 389_directory_server | 1.2.8 | |
redhat | directory_server | 8.2 | |
redhat | directory_server | 8.2.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "CE2E9C8D-FFEE-424C-BBA6-42BD4309D18A", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F2E9CEF-F30D-4374-A7E2-052102B602A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "16A8729B-B00B-4871-B083-6B10A5034721", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "6335FA65-9498-40AF-AE2B-034DA2823821", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "8CF92ADB-B5B0-43D7-93D8-CBA3AE46EB8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc2:*:*:*:*:*:*", "matchCriteriaId": "17F8ED59-E27A-4B9B-8BB8-66FAB2B2DCFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc3:*:*:*:*:*:*", "matchCriteriaId": "4200CEAB-4E14-48C8-9D6F-F86796475019", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc4:*:*:*:*:*:*", "matchCriteriaId": "3179916B-F98C-4D10-82AB-59DCCACBE8DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "B44B5289-08BB-4D62-B60D-1BD738472B1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a2:*:*:*:*:*:*", "matchCriteriaId": "02392BBF-AFAB-4739-BAF6-E930692AB28F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a3:*:*:*:*:*:*", "matchCriteriaId": "BFF70436-E01E-4912-AC31-B600F5E8CB4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a4:*:*:*:*:*:*", "matchCriteriaId": "360BA51B-B47E-4537-B564-9E628DF4E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "987F04BC-75DC-4959-AE32-070F11F9EBC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "078BCE55-90BB-48DE-92D1-9A152338158C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc3:*:*:*:*:*:*", "matchCriteriaId": "595F5AEE-E4A9-40E0-AF03-69AF689C4916", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc6:*:*:*:*:*:*", "matchCriteriaId": "FED47519-F254-4545-8551-FFBD0B4F9FAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc7:*:*:*:*:*:*", "matchCriteriaId": "A06C0421-74B7-4F9D-9F3A-18BF62BDD4D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "83F772DF-B8A7-4577-9AC6-3234B8C7FFAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.7:alpha3:*:*:*:*:*:*", "matchCriteriaId": "60624BFB-BB50-47F9-BB6D-BC92B40988BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "17C879AE-7435-43F5-94E5-A7ED84E46D0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha1:*:*:*:*:*:*", "matchCriteriaId": "5809DC7B-AC50-4E03-A8FA-6C2C6B67A400", "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha2:*:*:*:*:*:*", "matchCriteriaId": "04FED7B7-7D97-4020-9D5C-A7150B43838C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:directory_server:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "EDC61481-16C5-44EF-AA40-8423A40B2581", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C92B4226-6D3D-4430-A753-92E828FBBB8C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The (1) backup and restore scripts, (2) main initialization script, and (3) ldap-agent script in 389 Directory Server 1.2.x (aka Red Hat Directory Server 8.2.x) place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory." }, { "lang": "es", "value": "Las secuencias de comandos de (1) copia de seguridad y restauraci\u00f3n (2) inicializaci\u00f3n principal, y (3) ldap-agente en 389 Directory Server v1.2.x (tambi\u00e9n conocido como Red Hat Directory Server v8.2.x) pone un nombre de directorio con longitud cero en LD_LIBRARY_PATH, lo que permite a usuarios locales conseguir privilegios a trav\u00e9s de un troyano en una librer\u00eda compartida en el directorio de trabajo actual." } ], "id": "CVE-2011-0532", "lastModified": "2024-11-21T01:24:13.983", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-23T19:00:01.967", "references": [ { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2011-0293.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/46489" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1025102" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=672468" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65637" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0293.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46489" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025102" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=672468" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65637" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-12 13:15
Modified
2024-11-21 08:49
Severity ?
Summary
A heap overflow flaw was found in 389-ds-base. This issue leads to a denial of service when writing a value larger than 256 chars in log_entry_attr.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:389_directory_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "555F8661-DCE6-441E-9251-CD8D8E8734F6", "versionEndExcluding": "2.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:directory_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BCE19AC-8DA8-4574-B122-CF1FFB20875D", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:11.7:*:*:*:*:*:*:*", "matchCriteriaId": "9684A709-4D17-4AEB-BB13-9DC3B75EF902", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:directory_server:11.8:*:*:*:*:*:*:*", "matchCriteriaId": "9BF83982-31CF-4692-9055-BB65B59AFA08", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:41:*:*:*:*:*:*:*", "matchCriteriaId": "B2D4E93B-C80E-4F15-9177-8B31016381C0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:directory_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "A3DAF61A-58A9-41A6-A4DC-64148055B0C1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "3C74F6FA-FA6C-4648-9079-91446E45EE47", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "6C3741B8-851F-475D-B428-523F4F722350", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*", "matchCriteriaId": "62C31522-0A17-4025-B269-855C7F4B45C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "3C74F6FA-FA6C-4648-9079-91446E45EE47", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "3EFBEEE7-8BC5-4F4E-8EFA-42A6743152BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8:*:*:*:*:*:*:*", "matchCriteriaId": "83981111-E13A-4A88-80FD-F63D7CCAA47F", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "78825319-8A45-4880-B7C4-2B223029DDD3", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "C415CABF-E1C4-4E95-9424-AEEEAFF1CAE7", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8:*:*:*:*:*:*:*", "matchCriteriaId": "83364F5C-57F4-4D57-B54F-540CAC1D7753", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8:*:*:*:*:*:*:*", "matchCriteriaId": "A49ABD84-6755-4894-AD4E-49AAD39933C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "71DDE212-1018-4554-9C06-4908442DE134", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "76C24D94-834A-4E9D-8F73-624AFA99AAA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "F32CA554-F9D7-425B-8F1C-89678507F28C", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "871A5C26-DB7B-4870-A5B2-5DD24C90B4A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.8:*:*:*:*:*:*:*", "matchCriteriaId": "12A809B2-2771-4780-9E0D-6A7B4A534CFB", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "FE4AEBCB-B1E6-4A6A-9E8C-DDC5A003BCB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "1272DF03-7674-4BD4-8E64-94004B195448", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*", "matchCriteriaId": "F1CA946D-1665-4874-9D41-C7D963DD1F56", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB096D5D-E8F6-4164-8B76-0217B7151D30", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.8:*:*:*:*:*:*:*", "matchCriteriaId": "01ED4F33-EBE7-4C04-8312-3DA580EFFB68", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A heap overflow flaw was found in 389-ds-base. This issue leads to a denial of service when writing a value larger than 256 chars in log_entry_attr." }, { "lang": "es", "value": "Se encontr\u00f3 una falla de desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en 389-ds-base. Este problema provoca una denegaci\u00f3n de servicio al escribir un valor superior a 256 caracteres en log_entry_attr." } ], "id": "CVE-2024-1062", "lastModified": "2024-11-21T08:49:42.513", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "secalert@redhat.com", "type": "Primary" } ] }, "published": "2024-02-12T13:15:09.210", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:1074" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:1372" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:3047" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:4209" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:4633" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:5690" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:7458" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2024-1062" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256711" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2261879" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:1074" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:1372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:3047" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:4209" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:4633" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2024-1062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256711" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2261879" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "secalert@redhat.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-04-16 18:05
Modified
2024-11-21 00:43
Severity ?
Summary
The replication monitor CGI script (repl-monitor-cgi.pl) in Red Hat Administration Server, as used by Red Hat Directory Server 8.0 EL4 and EL5, allows remote attackers to execute arbitrary commands.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | directory_server | 7.1 | |
redhat | directory_server | 8 | |
redhat | directory_server | 8 | |
redhat | fedora_directory_server | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:directory_server:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "ABADB3F7-AD65-4E62-BEA5-782539911B6B", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:directory_server:8:el4:*:*:*:*:*:*", "matchCriteriaId": "1C61BA21-1EC5-412D-83E1-AF939169D702", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:directory_server:8:el5:*:*:*:*:*:*", "matchCriteriaId": "E4C96B58-E323-4609-BC88-5D5BFA9D3E55", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:fedora_directory_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6DB2E5A-9A1C-4A29-BCB7-A7E8C661D394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The replication monitor CGI script (repl-monitor-cgi.pl) in Red Hat Administration Server, as used by Red Hat Directory Server 8.0 EL4 and EL5, allows remote attackers to execute arbitrary commands." }, { "lang": "es", "value": "Las secuencias de comandos CGI Replication Monitor (monitor de duplicaci\u00f3n) en Red Hat Administration Server, como lo usan Red Hat Directory Server 8.0 EL4 y EL5, permite a atacantes remotos ejecutar comandos de su elecci\u00f3n." } ], "id": "CVE-2008-0892", "lastModified": "2024-11-21T00:43:09.767", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-04-16T18:05:00.000", "references": [ { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01433676" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01433676" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/29761" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/29826" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/30114" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0199.html" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0201.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/28802" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1019856" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2008/1449/references" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=437301" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41840" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00380.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00386.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01433676" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01433676" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/29761" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/29826" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/30114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0199.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0201.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/28802" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1019856" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2008/1449/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=437301" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41840" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00380.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00386.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }