8.1
CVSSv3

CVE-2017-15135

Published: 24/01/2018 Updated: 12/02/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

It was found that 389-ds-base since 1.3.6.1 up to and including 1.4.0.3 did not always handle internal hash comparison operations correctly during the authentication process. A remote, unauthenticated attacker could potentially use this flaw to bypass the authentication process under very rare and specific circumstances.

Vulnerable Product Search on Vulmon Subscribe to Product

fedoraproject 389 directory server

Vendor Advisories

Synopsis Important: 389-ds-base security update Type/Severity Security Advisory: Important Topic An update for 389-ds-base is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) bas ...
Synopsis Important: 389-ds-base security and bug fix update Type/Severity Security Advisory: Important Topic An update for 389-ds-base is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring Syste ...
Debian Bug report logs - #888451 389-ds-base: CVE-2017-15135: Authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_mallocc Package: src:389-ds-base; Maintainer for src:389-ds-base is Debian FreeIPA Team <pkg-freeipa-devel@alioth-listsdebiannet>; Reported by: Salvatore Bonaccorso <carnil@debi ...
Debian Bug report logs - #888452 389-ds-base: CVE-2017-15134: Remote DoS via search filters in slapi_filter_sprintf in slapd/utilc Package: src:389-ds-base; Maintainer for src:389-ds-base is Debian FreeIPA Team <pkg-freeipa-devel@alioth-listsdebiannet>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Th ...
Authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_mallocc:It was found that 389-ds-base did not always handle internal hash comparison operations correctly during the authentication process A remote, unauthenticated attacker could potentially use this flaw to bypass the authentication process under very rare and sp ...
Authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_mallocc:It was found that 389-ds-base did not always handle internal hash comparison operations correctly during the authentication process A remote, unauthenticated attacker could potentially use this flaw to bypass the authentication process under very rare and sp ...
It was found that 389-ds-base did not always handle internal hash comparison operations correctly during the authentication process A remote, unauthenticated attacker could potentially use this flaw to bypass the authentication process under very rare and specific circumstances ...