Severity
7.5HIGH
EPSS
5.7%
top 9.60%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 1
Latest updateMay 14

Description

A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5 handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages6 packages

Debian389-ds-base< 1.3.7.9-1+2
CVEListV5red_hat,_inc./389-ds-base1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5
NVDfedoraproject/389_directory_server1.3.6.11.3.6.13+2

Also affects: Enterprise Linux 7.4

Patches

🔴Vulnerability Details

3
GHSA
GHSA-7358-vfr4-6m85: A stack buffer overflow flaw was found in the way 389-ds-base 12022-05-14
OSV
CVE-2017-15134: A stack buffer overflow flaw was found in the way 389-ds-base 12018-03-01
CVEList
CVE-2017-15134: A stack buffer overflow flaw was found in the way 389-ds-base 12018-03-01

📋Vendor Advisories

2
Red Hat
389-ds-base: Remote DoS via search filters in slapi_filter_sprintf in slapd/util.c2018-01-22
Debian
CVE-2017-15134: 389-ds-base - A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3...2017

💬Community

2
Bugzilla
CVE-2017-15134 389-ds-base: Remote DoS via search filters in slapi_filter_sprintf in slapd/util.c [fedora-all]2018-01-22
Bugzilla
CVE-2017-15134 389-ds-base: Remote DoS via search filters in slapi_filter_sprintf in slapd/util.c2018-01-05
CVE-2017-15134 (HIGH CVSS 7.5) | A stack buffer overflow flaw was fo | cvebase.io