slapd (aka ns-slapd) in 389 Directory Server prior to 1.2.8.a2 does not properly manage the c_timelimit field of the connection table element, which allows remote malicious users to cause a denial of service (daemon outage) via Simple Paged Results connections, as demonstrated by using multiple processes to replay TCP sessions, a different vulnerability than CVE-2011-0019.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
fedoraproject 389 directory server 1.2.6 |
||
fedoraproject 389 directory server 1.2.6.1 |
||
fedoraproject 389 directory server 1.2.5 |
||
fedoraproject 389 directory server |
||
fedoraproject 389 directory server 1.2.7 |
||
fedoraproject 389 directory server 1.2.7.5 |
||
fedoraproject 389 directory server 1.2.1 |
||
fedoraproject 389 directory server 1.2.2 |
||
fedoraproject 389 directory server 1.2.3 |