2.3
CVSSv2

CVE-2012-0833

Published: 03/07/2012 Updated: 17/07/2012
CVSS v2 Base Score: 2.3 | Impact Score: 2.9 | Exploitability Score: 4.4
VMScore: 205
Vector: AV:A/AC:M/Au:S/C:N/I:N/A:P

Vulnerability Summary

The acllas__handle_group_entry function in servers/plugins/acl/acllas.c in 389 Directory Server prior to 1.2.10 does not properly handled access control instructions (ACIs) that use certificate groups, which allows remote authenticated LDAP users with a certificate group to cause a denial of service (infinite loop and CPU consumption) by binding to the server.

Vulnerable Product Search on Vulmon Subscribe to Product

fedoraproject 389 directory server 1.2.6

fedoraproject 389 directory server 1.2.6.1

fedoraproject 389 directory server 1.2.8

fedoraproject 389 directory server 1.2.7.5

fedoraproject 389 directory server 1.2.1

fedoraproject 389 directory server 1.2.7

fedoraproject 389 directory server 1.2.2

fedoraproject 389 directory server 1.2.5

fedoraproject 389 directory server

fedoraproject 389 directory server 1.2.8.2

fedoraproject 389 directory server 1.2.8.3

fedoraproject 389 directory server 1.2.9.9

fedoraproject 389 directory server 1.2.10

fedoraproject 389 directory server 1.2.3

fedoraproject 389 directory server 1.2.8.1

Vendor Advisories

Synopsis Low: 389-ds-base security, bug fix, and enhancement update Type/Severity Security Advisory: Low Topic Updated 389-ds-base packages that fix one security issue, several bugs, andadd various enhancements are now available for Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated thi ...
Synopsis Low: Red Hat Directory Server security and bug fix update Type/Severity Security Advisory: Low Topic Updated Red Hat Directory Server and related packages that fix one securityissue and multiple bugs are now available for Red Hat Directory Server 82The Red Hat Security Response Team has rated thi ...

Github Repositories

Crawling vulnerability information through debian and NVD.

CVEspider Crawling vulnerability information through debian and NVD Usage: /spider_CVE The output information is in json format, the format is as follows: { "cve": "CVE-2012-0833", "package": "389-ds-base", "cve_description": "The acllas__handle_group_entry function in