Red Hat Directory Server Crafted Search Pattern Denial of Service Vulnerability
BID:30871
Info
Red Hat Directory Server Crafted Search Pattern Denial of Service Vulnerability
| Bugtraq ID: | 30871 |
| Class: | Design Error |
| CVE: |
CVE-2008-2930 |
| Remote: | Yes |
| Local: | No |
| Published: | Aug 27 2008 12:00AM |
| Updated: | Apr 13 2015 10:17PM |
| Credit: | Ulf Weltman of Hewlett Packard |
| Vulnerable: |
Redhat Enterprise IPA 1 for RHEL 5 Server 0 Redhat Directory Server 8 EL 5 Redhat Directory Server 8 EL 4 Redhat Directory Server 7.1 SP6 Redhat Directory Server 7.1 SP5 Redhat Directory Server 7.1 SP4 Redhat Directory Server 7.1 SP3 Redhat Directory Server 7.1 SP2 Redhat Directory Server 7.1 SP1 Redhat Directory Server 7.1 HP HP-UX 11.23 HP HP-UX 11.11 HP HP-UX 11.31 |
| Not Vulnerable: |
Redhat Directory Server 7.1 SP7 |
Discussion
Red Hat Directory Server Crafted Search Pattern Denial of Service Vulnerability
Red Hat Directory Server is prone to a denial-of-service vulnerability because the server fails to handle specially crafted search patterns.
An attacker can exploit this issue to consume CPU resources with one search request, effectively blocking additional search requests from executing. Legitimate users may be prevented from authenticating to network resources that use the affected server for authentication.
Red Hat Directory Server 7.1 and 8 are affected.
Red Hat Directory Server is prone to a denial-of-service vulnerability because the server fails to handle specially crafted search patterns.
An attacker can exploit this issue to consume CPU resources with one search request, effectively blocking additional search requests from executing. Legitimate users may be prevented from authenticating to network resources that use the affected server for authentication.
Red Hat Directory Server 7.1 and 8 are affected.
Exploit / POC
Red Hat Directory Server Crafted Search Pattern Denial of Service Vulnerability
An attacker can exploit this issue by using standard network utilities.
The following example regular expressions are available:
2.6/AV:N/AC:H/Au:N/C:N/I:N/A:P
4.0/AV:N/AC:L/Au:S/C:N/I:N/A:P
An attacker can exploit this issue by using standard network utilities.
The following example regular expressions are available:
2.6/AV:N/AC:H/Au:N/C:N/I:N/A:P
4.0/AV:N/AC:L/Au:S/C:N/I:N/A:P
Solution / Fix
Red Hat Directory Server Crafted Search Pattern Denial of Service Vulnerability
Solution:
The vendor has released updates. Please see the references for more information.
Solution:
The vendor has released updates. Please see the references for more information.
References
Red Hat Directory Server Crafted Search Pattern Denial of Service Vulnerability
References:
References:
- Bug 454065 CVE-2008-2930 Directory Server: temporary DoS via crafted pattern sea (Red Hat)
- Red Hat Directory Server Homepage (Red Hat)
- HPSBUX02354 SSRT080113 rev.1 - HP-UX Running Netscape / Red Hat Directory Server (HP)
- RHSA-2008:0596-18 Red Hat Directory Server 7.1 Service Pack 7 security update (Red Hat)
- RHSA-2008:0602-13 Moderate: redhat-ds-base and redhat-ds-admin security and bug (Red Hat)