LDAP Query Flaw Leads to Denial of Service on 389-ds-base Directory Server
CVE-2024-3657

7.5HIGH

Summary

A vulnerability exists in the 389-ds-base software, where an attacker can exploit a specially-crafted Lightweight Directory Access Protocol (LDAP) query. This exploitation can lead to a failure of the directory server, resulting in a denial of service (DoS). The flaw presents a significant risk for users relying on the directory service for critical operations and could disrupt network communications. It is crucial for organizations using this product to monitor their systems and apply necessary patches to mitigate the risk.

Affected Version(s)

Red Hat Directory Server 11.7 for RHEL 8 8080020240909040333.f969626e

Red Hat Directory Server 11.8 for RHEL 8 8090020240606122459.91529cd0

Red Hat Directory Server 11.9 for RHEL 8 8100020240604161237.37ed7c03

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database
.