CVE-2024-5953
389-ds-base: malformed userpassword hash may cause denial of service
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A denial of service vulnerability was found in the 389-ds-base LDAP server. This issue may allow an authenticated user to cause a server denial of service while attempting to log in with a user with a malformed hash in their password.
Se encontró una vulnerabilidad de denegación de servicio en el servidor LDAP 389-ds-base. Este problema puede permitir que un usuario autenticado provoque una denegación de servicio del servidor al intentar iniciar sesión con un usuario con un hash mal formado en su contraseña.
This update for 389-ds fixes the following issues. Persist extracted key path for ldap_ssl_client_init over repeat invocations Re-enable use of .dsrc basedn for dsidm commands RFE: Use previously extracted key path Update dsidm to prioritize basedn from .dsrc over interactive input UI: Instance fails to load when DB backup directory doesn't exist Improve online import robustness when the server is under load Ensure all slapi_log_err calls end format strings with newline character
RFE: when memberof is enabled, defer updates of members from the update of the group Provide more information in the error message during setup_ol_tls_conn Wrong set of entries returned for some search filters Schema lib389 object is not keeping custom schema data upon editing UI: Fix audit issue with npm - micromatch. Fixed long delay when setting replication agreement with dsconf.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-06-13 CVE Reserved
- 2024-06-18 CVE Published
- 2025-04-15 EPSS Updated
- 2025-07-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-1288: Improper Validation of Consistency within Input
CAPEC
References (12)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2024:4633 | 2024-07-18 | |
https://access.redhat.com/security/cve/CVE-2024-5953 | 2024-07-18 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2292104 | 2024-07-18 | |
https://access.redhat.com/errata/RHSA-2024:4997 | 2025-07-05 | |
https://access.redhat.com/errata/RHSA-2024:5192 | 2025-07-05 | |
https://access.redhat.com/errata/RHSA-2024:5690 | 2025-07-05 | |
https://access.redhat.com/errata/RHSA-2024:6153 | 2025-07-05 | |
https://access.redhat.com/errata/RHSA-2024:6568 | 2025-07-05 | |
https://access.redhat.com/errata/RHSA-2024:6569 | 2025-07-05 | |
https://access.redhat.com/errata/RHSA-2024:6576 | 2025-07-05 | |
https://access.redhat.com/errata/RHSA-2024:7458 | 2025-07-05 | |
https://access.redhat.com/errata/RHSA-2025:1632 | 2025-07-05 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Oracle Search vendor "Oracle" | Linux Search vendor "Oracle" for product "Linux" | * | - |
Affected
| ||||||
Red Hat Search vendor "Red Hat" | Enterprise Linux Search vendor "Red Hat" for product "Enterprise Linux" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Directory Server Search vendor "Redhat" for product "Directory Server" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Directory Server E4s Search vendor "Redhat" for product "Directory Server E4s" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Directory Server Eus Search vendor "Redhat" for product "Directory Server Eus" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Rhel Eus Search vendor "Redhat" for product "Rhel Eus" | * | - |
Affected
| ||||||
Alma Search vendor "Alma" | Linux Search vendor "Alma" for product "Linux" | * | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | * | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | * | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Leap Search vendor "Opensuse" for product "Leap" | * | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Linux Search vendor "Oracle" for product "Linux" | * | - |
Affected
| ||||||
Red Hat Search vendor "Red Hat" | Directory Server Search vendor "Red Hat" for product "Directory Server" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Rhel Els Search vendor "Redhat" for product "Rhel Els" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Rhel Eus Search vendor "Redhat" for product "Rhel Eus" | * | - |
Affected
| ||||||
Rocky Search vendor "Rocky" | Linux Search vendor "Rocky" for product "Linux" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Sle-module-server-applications Search vendor "Suse" for product "Sle-module-server-applications" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Sle Hpc-espos Search vendor "Suse" for product "Sle Hpc-espos" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Sle Hpc-ltss Search vendor "Suse" for product "Sle Hpc-ltss" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Sle Hpc Search vendor "Suse" for product "Sle Hpc" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Sles-ltss Search vendor "Suse" for product "Sles-ltss" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Sles Search vendor "Suse" for product "Sles" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Sles Sap Search vendor "Suse" for product "Sles Sap" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Suse-manager-proxy Search vendor "Suse" for product "Suse-manager-proxy" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Suse-manager-server Search vendor "Suse" for product "Suse-manager-server" | * | - |
Affected
|