CVE-2022-0918: A vulnerability was discovered in the 389 Directory Server that allows an unauthenticated attacker with network access to the LDAP port to cause a denial of service. The denial of service is triggered by a single message sent over a TCP connection, no bind or other authentication is required. The message triggers a segmentation fault that results in slapd crashing. No references to upstream again.
CVE-2022-0996 (https://github.com/ByteHackr/389-ds-base): https://bugzilla.redhat.com/show_bug.cgi?id=2064769 A vulnerability was found in the 389 Directory Server that allows expired passwords to access the database to cause improper authentication.
(In reply to John Helmert III from comment #0) > CVE-2022-0918: > > A vulnerability was discovered in the 389 Directory Server that allows an > unauthenticated attacker with network access to the LDAP port to cause a > denial of service. The denial of service is triggered by a single message > sent over a TCP connection, no bind or other authentication is required. The > message triggers a segmentation fault that results in slapd crashing. > > No references to upstream again. https://github.com/389ds/389-ds-base/issues/5242 Unreleased patches for each branch linked in a comment on the issue.
CVE-2022-2850 (https://bugzilla.redhat.com/show_bug.cgi?id=2118691): A flaw was found In 389-ds-base. When the Content Synchronization plugin is enabled, an authenticated user can reach a NULL pointer dereference using a specially crafted query. This flaw allows an authenticated attacker to cause a denial of service. This CVE is assigned against an incomplete fix of CVE-2021-3514. RedHat bug: https://bugzilla.redhat.com/show_bug.cgi?id=2055815 Patches exist in all branches. Fix seems released in 2.1.5 for 2.1.x, but seemingly not yet for 1.4.x.