CVE-2018-1089 vulnerability in Fedora Project and Other Products
Published on May 9, 2018
389-ds-base before versions 1.4.0.9, 1.3.8.1, 1.3.6.15 did not properly handle long search filters with characters needing escapes, possibly leading to buffer overflows. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
Weakness Type
Heap-based Buffer Overflow
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Products Associated with CVE-2018-1089
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2018-1089 are published in these products:
Affected Versions
unspecified 389-ds-base:- Version 389-ds-base 1.4.0.9 is affected.
- Version 389-ds-base 1.3.8.1 is affected.
- Version 389-ds-base 1.3.6.15 is affected.
Exploit Probability
EPSS
14.57%
Percentile
94.32%
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.