A denial of service vulnerability was found in the 389-ds-base LDAP server. This issue may allow an authenticated user to cause a server denial of service while attempting to log in with a user with a malformed hash in their password.
Workaround:
The product receives a complex input with multiple elements or fields that must be consistent with each other, but it does not validate or incorrectly validates that the input is actually consistent.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2024:4633 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:4997 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:5192 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:5690 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:6153 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:6568 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:6569 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:6576 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:7458 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:1632 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2024-5953 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2292104 | issue tracking |