CVE-2011-1067
slapd (aka ns-slapd) in 389 Directory Server before 1.2.8.a2 does not properly manage the c_timelimit field of the connection table element, which allows remote attackers to cause a denial of service (daemon outage) via Simple Paged Results connections, as demonstrated by using multiple processes to replay TCP sessions, a different vulnerability than CVE-2011-0019.Enginsight
Vendor | Product | Version |
---|---|---|
fedoraproject | 389_directory_server | 𝑥 ≤ 1.2.8 |
fedoraproject | 389_directory_server | 1.2.1 |
fedoraproject | 389_directory_server | 1.2.2 |
fedoraproject | 389_directory_server | 1.2.3 |
fedoraproject | 389_directory_server | 1.2.5 |
fedoraproject | 389_directory_server | 1.2.5 |
fedoraproject | 389_directory_server | 1.2.5 |
fedoraproject | 389_directory_server | 1.2.5 |
fedoraproject | 389_directory_server | 1.2.5 |
fedoraproject | 389_directory_server | 1.2.6 |
fedoraproject | 389_directory_server | 1.2.6 |
fedoraproject | 389_directory_server | 1.2.6 |
fedoraproject | 389_directory_server | 1.2.6 |
fedoraproject | 389_directory_server | 1.2.6 |
fedoraproject | 389_directory_server | 1.2.6 |
fedoraproject | 389_directory_server | 1.2.6 |
fedoraproject | 389_directory_server | 1.2.6 |
fedoraproject | 389_directory_server | 1.2.6 |
fedoraproject | 389_directory_server | 1.2.6.1 |
fedoraproject | 389_directory_server | 1.2.7 |
fedoraproject | 389_directory_server | 1.2.7.5 |
Common Weakness Enumeration