CVE-2017-2668
Published: 22 June 2018
389-ds-base before versions 1.3.5.17 and 1.3.6.10 is vulnerable to an invalid pointer dereference in the way LDAP bind requests are handled. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service.
Priority
CVSS 3 base score: 6.5
Status
Package | Release | Status |
---|---|---|
389-ds-base Launchpad, Ubuntu, Debian |
Upstream |
Released
(1.3.5.17-1)
|
Ubuntu 20.10 (Groovy Gorilla) |
Not vulnerable
(1.3.7.10-1ubuntu1)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Not vulnerable
(1.3.7.10-1ubuntu1)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Not vulnerable
(1.3.7.10-1ubuntu1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Needed
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was needed)
|
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2668
- https://bugzilla.redhat.com/show_bug.cgi?id=1436575
- https://pagure.io/389-ds-base/issue/49184
- https://git.centos.org/raw/rpms!389-ds-base!/c9e5dad69e2b497f118efac56f43cc6c74b6a695/SOURCES!0072-fix-for-cve-2017-2668-simple-return-text-if-suffix-n.patch
- NVD
- Launchpad
- Debian