CVE-2024-8445 โ€” Improper Input Validation in 389-ds-base

Severity
5.7MEDIUMNVD
EPSS
0.1%
top 75.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 5

Description

The fix for CVE-2024-2199 in 389-ds-base was insufficient to cover all scenarios. In certain product versions, an authenticated user may cause a server crash while modifying `userPassword` using malformed input.

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.1 | Impact: 3.6

Affected Packages1 packages

โ–ถDebianport389/389-ds-base< 1.4.4.11-2+deb11u1+2

๐Ÿ”ดVulnerability Details

3
CVEList
389-ds-base: server crash while modifying `userpassword` using malformed input (incomplete fix for cve-2024-2199)โ†—2024-09-05
โ–ถ
GHSA
GHSA-9q6m-vr5h-rqq5: The fix for CVE-2024-2199 in 389-ds-base was insufficient to cover all scenariosโ†—2024-09-05
โ–ถ
OSV
CVE-2024-8445: The fix for CVE-2024-2199 in 389-ds-base was insufficient to cover all scenariosโ†—2024-09-05
โ–ถ

๐Ÿ“‹Vendor Advisories

2
Red Hat
389-ds-base: server crash while modifying `userPassword` using malformed input (Incomplete fix for CVE-2024-2199)โ†—2024-09-05
โ–ถ
Debian
CVE-2024-8445: 389-ds-base - The fix for CVE-2024-2199 in 389-ds-base was insufficient to cover all scenarios...โ†—2024
โ–ถ
CVE-2024-8445 โ€” Improper Input Validation | cvebase