Vulnerabilities (CVE)

Filtered by vendor Redhat Subscribe
Filtered by product Directory Server
Total 26 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2012-2746 2 Fedoraproject, Redhat 2 389 Directory Server, Directory Server 2017-09-19 2.1 LOW N/A
389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), when the password of a LDAP user has been changed and audit logging is enabled, saves the new password to the log in plain text, which allows remote authenticated users to read the password.
CVE-2011-0532 2 Fedoraproject, Redhat 2 389 Directory Server, Directory Server 2017-08-17 6.2 MEDIUM N/A
The (1) backup and restore scripts, (2) main initialization script, and (3) ldap-agent script in 389 Directory Server 1.2.x (aka Red Hat Directory Server 8.2.x) place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
CVE-2008-0890 1 Redhat 1 Directory Server 2017-08-08 4.6 MEDIUM N/A
Red Hat Directory Server 7.1 before SP4 uses insecure permissions for certain directories, which allows local users to modify JAR files and execute arbitrary code via unknown vectors.
CVE-2008-0893 1 Redhat 1 Directory Server 2017-08-08 7.5 HIGH N/A
Red Hat Administration Server, as used by Red Hat Directory Server 8.0 EL4 and EL5, does not properly restrict access to CGI scripts, which allows remote attackers to perform administrative actions.
CVE-2011-0019 2 Fedoraproject, Redhat 2 389 Directory Server, Directory Server 2011-03-31 7.5 HIGH N/A
slapd (aka ns-slapd) in 389 Directory Server 1.2.7.5 (aka Red Hat Directory Server 8.2.x or dirsrv) does not properly handle simple paged result searches, which allows remote attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact via multiple search requests.
CVE-2011-0022 2 Fedoraproject, Redhat 2 389 Directory Server, Directory Server 2011-03-31 4.7 MEDIUM N/A
The setup scripts in 389 Directory Server 1.2.x (aka Red Hat Directory Server 8.2.x), when multiple unprivileged instances are configured, use 0777 permissions for the /var/run/dirsrv directory, which allows local users to cause a denial of service (daemon outage or arbitrary process termination) by replacing PID files contained in this directory.