A flaw was found in 389-ds-base. A specially-crafted LDAP query can potentially cause a failure on the directory server, leading to a denial of service
A flaw was found in 389-ds-base. A specially-crafted LDAP query can potentially cause a failure on the directory server, leading to a denial of service
| Vendor | Product | Versions |
|---|---|---|
| Red Hat | Red Hat Directory Server 11.5 E4S for RHEL 8 | 8060020250210084424.0ca98e7e |
| Red Hat | Red Hat Directory Server 11.7 for RHEL 8 | 8080020240909040333.f969626e |
| Red Hat | Red Hat Directory Server 11.8 for RHEL 8 | 8090020240606122459.91529cd0 |
| Red Hat | Red Hat Directory Server 11.9 for RHEL 8 | 8100020240604161237.37ed7c03 |
| Red Hat | Red Hat Directory Server 12.2 EUS for RHEL 9 | 9020020240916150035.1674d574 |
| Red Hat | Red Hat Directory Server 12.4 for RHEL 9 | 9040020240604143706.1674d574 |
| Red Hat | Red Hat Enterprise Linux 7 | 0:1.3.11.1-5.el7_9 |
| Red Hat | Red Hat Enterprise Linux 8 | 8100020240613122040.25e700aa |
| Red Hat | Red Hat Enterprise Linux 8.8 Extended Update Support | 8080020240807050952.6dbb3803 |
| Red Hat | Red Hat Enterprise Linux 9 | 0:2.4.5-8.el9_4 |
| Red Hat | Red Hat Enterprise Linux 9.2 Extended Update Support | 0:2.2.4-9.el9_2 |
| Red Hat | Red Hat Enterprise Linux 10 | unspecified |
| Red Hat | Red Hat Enterprise Linux 6 | unspecified |
Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.