// For flags

CVE-2013-4485

389-ds-base: DoS due to improper handling of ger attr searches

Severity Score

6.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

389 Directory Server 1.2.11.15 (aka Red Hat Directory Server before 8.2.11-14) allows remote authenticated users to cause a denial of service (crash) via multiple @ characters in a GER attribute list in a search request.

389 Directory Server 1.2.11.15 (también conocido como Red Hat Directory Server anterior a la versión 8.2.11-14) permite a usuarios remotos autenticados provocar una denegación de servicio (caída) a través de múltiples caracteres @ en una lista de atributo GER de una petición de búsqueda.

The 389 Directory Server is an LDAPv3 compliant server. The base packages include the Lightweight Directory Access Protocol server and command-line utilities for server administration. It was discovered that the 389 Directory Server did not properly handle certain Get Effective Rights search queries when the attribute list, which is a part of the query, included several names using the '@' character. An attacker able to submit search queries to the 389 Directory Server could cause it to crash. All 389-ds-base users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, the 389 server service will be restarted automatically.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
None
Integrity
None
Availability
Partial
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-06-12 CVE Reserved
  • 2013-11-21 CVE Published
  • 2024-08-06 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Redhat
Search vendor "Redhat"
Enterprise Linux
Search vendor "Redhat" for product "Enterprise Linux"
6.0
Search vendor "Redhat" for product "Enterprise Linux" and version "6.0"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
389 Directory Server
Search vendor "Fedoraproject" for product "389 Directory Server"
1.2.11.15
Search vendor "Fedoraproject" for product "389 Directory Server" and version "1.2.11.15"
-
Affected
Redhat
Search vendor "Redhat"
Directory Server
Search vendor "Redhat" for product "Directory Server"
<= 8.2
Search vendor "Redhat" for product "Directory Server" and version " <= 8.2"
-
Affected
Redhat
Search vendor "Redhat"
Directory Server
Search vendor "Redhat" for product "Directory Server"
7.1
Search vendor "Redhat" for product "Directory Server" and version "7.1"
-
Affected
Redhat
Search vendor "Redhat"
Directory Server
Search vendor "Redhat" for product "Directory Server"
8.0
Search vendor "Redhat" for product "Directory Server" and version "8.0"
-
Affected
Redhat
Search vendor "Redhat"
Directory Server
Search vendor "Redhat" for product "Directory Server"
8.1
Search vendor "Redhat" for product "Directory Server" and version "8.1"
-
Affected