389-ds-base before version 1.3.6 is vulnerable to an improperly NULL terminated array in the uniqueness_entry_to_config() function in the "attribute uniqueness" plugin of 389 Directory Server. An authenticated, or possibly unauthenticated, attacker could use this flaw to force an out-of-bound heap memory read, possibly triggering a crash of the LDAP service.
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://pagure.io/389-ds-base/issue/48986 | third party advisory patch |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2591 | third party advisory issue tracking |
http://www.securityfocus.com/bid/95670 | third party advisory vdb entry |