Out-of-bounds Read Affecting 389-ds-base package, versions <1.3.5.15-2


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.31% (70th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN11-389DSBASE-531560
  • published30 Apr 2018
  • disclosed30 Apr 2018

Introduced: 30 Apr 2018

CVE-2017-2591  (opens in a new tab)
CWE-125  (opens in a new tab)

How to fix?

Upgrade Debian:11 389-ds-base to version 1.3.5.15-2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream 389-ds-base package and not the 389-ds-base package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

389-ds-base before version 1.3.6 is vulnerable to an improperly NULL terminated array in the uniqueness_entry_to_config() function in the "attribute uniqueness" plugin of 389 Directory Server. An authenticated, or possibly unauthenticated, attacker could use this flaw to force an out-of-bound heap memory read, possibly triggering a crash of the LDAP service.