CVE-2013-4283
389-ds-base: ns-slapd crash due to bogus DN
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
ns-slapd in 389 Directory Server before 1.3.0.8 allows remote attackers to cause a denial of service (server crash) via a crafted Distinguished Name (DN) in a MOD operation request.
ns-slapd en 389 Directory Server anterior a v1.3.0.8 permite a atacantes remotos provocar una denegación de servicio (caída del servidor) a través de un Distinguished Name (DN) manipulado en una operación de petición MOD.
The 389 Directory Server is an LDAPv3 compliant server. The base packages include the Lightweight Directory Access Protocol server and command-line utilities for server administration. It was discovered that the 389 Directory Server did not properly handle the receipt of certain MOD operations with a bogus Distinguished Name. A remote, unauthenticated attacker could use this flaw to cause the 389 Directory Server to crash. All 389-ds-base users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, the 389 server service will be restarted automatically.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2013-06-12 CVE Reserved
- 2013-08-29 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (6)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://directory.fedoraproject.org/wiki/Releases/1.3.0.8 | 2013-09-11 |
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2013-1182.html | 2013-09-11 | |
http://secunia.com/advisories/54586 | 2013-09-11 | |
http://secunia.com/advisories/54650 | 2013-09-11 | |
https://bugzilla.redhat.com/show_bug.cgi?id=999634 | 2013-08-28 | |
https://access.redhat.com/security/cve/CVE-2013-4283 | 2013-08-28 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Fedoraproject Search vendor "Fedoraproject" | 389 Directory Server Search vendor "Fedoraproject" for product "389 Directory Server" | <= 1.3.0.7 Search vendor "Fedoraproject" for product "389 Directory Server" and version " <= 1.3.0.7" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | 389 Directory Server Search vendor "Fedoraproject" for product "389 Directory Server" | 1.3.0.2 Search vendor "Fedoraproject" for product "389 Directory Server" and version "1.3.0.2" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | 389 Directory Server Search vendor "Fedoraproject" for product "389 Directory Server" | 1.3.0.3 Search vendor "Fedoraproject" for product "389 Directory Server" and version "1.3.0.3" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | 389 Directory Server Search vendor "Fedoraproject" for product "389 Directory Server" | 1.3.0.4 Search vendor "Fedoraproject" for product "389 Directory Server" and version "1.3.0.4" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | 389 Directory Server Search vendor "Fedoraproject" for product "389 Directory Server" | 1.3.0.5 Search vendor "Fedoraproject" for product "389 Directory Server" and version "1.3.0.5" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | 389 Directory Server Search vendor "Fedoraproject" for product "389 Directory Server" | 1.3.0.6 Search vendor "Fedoraproject" for product "389 Directory Server" and version "1.3.0.6" | - |
Affected
|