SB2024101580 - Red Hat Directory Server 12 update for the redhat-ds:12 module 



SB2024101580 - Red Hat Directory Server 12 update for the redhat-ds:12 module

Published: October 15, 2024

Security Bulletin ID SB2024101580
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Heap-based buffer overflow (CVE-ID: CVE-2024-1062)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error when writing a value larger than 256 chars in log_entry_attr. A local user can pass specially crafted data to the application, trigger a heap-based buffer overflow and perform a denial of service (DoS) attack.


2) Input validation error (CVE-ID: CVE-2024-3657)

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input when parsing Kerberos AS-REQ packets. A remote user can send specially crafted query to the LDAP server and perform a denial of service (DoS) attack.


3) Input validation error (CVE-ID: CVE-2024-5953)

The vulnerability allows an attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of password hashes. A remote attacker can crash the LDAP server when attempting to log in with a user with a malformed hash in their password.


Remediation

Install update from vendor's website.