Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Directory)  >   Red Hat Directory Server Vendors:   Red Hat
Red Hat Directory Server Bug in ACI with Certificate Groups Lets Remote Authenticated Users Deny Service
SecurityTracker Alert ID:  1028190
SecurityTracker URL:
CVE Reference:   CVE-2012-0833   (Links to External Site)
Date:  Feb 21 2013
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 8.2
Description:   A vulnerability was reported in Red Hat Directory Server. A remote authenticated user can cause denial of service conditions.

The 389 Directory Server daemon (ns-slapd) does not properly handle access control instructions (ACIs) using certificate groups. A remote authenticated user that has a certificate group defined can cause ns-slapd to enter an infinite loop and consume excessive CPU resources.

Graham Leggett reported this vulnerability.

Impact:   A remote authenticated user can consume excessive CPU resources on the target system.
Solution:   The vendor has issued a fix.

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   State error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  5

Message History:   None.

 Source Message Contents

Subject:  [RHSA-2013:0549-01] Low: Red Hat Directory Server security and bug fix update

Hash: SHA1

                   Red Hat Security Advisory

Synopsis:          Low: Red Hat Directory Server security and bug fix update
Advisory ID:       RHSA-2013:0549-01
Product:           Red Hat Directory Server
Advisory URL:
Issue date:        2013-02-21
CVE Names:         CVE-2012-0833 

1. Summary:

Updated Red Hat Directory Server and related packages that fix one security
issue and multiple bugs are now available for Red Hat Directory Server 8.2.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

2. Relevant releases/architectures:

Red Hat Directory Server 8 (for RHEL 5 Server) - i386, x86_64

3. Description:

The redhat-ds-base packages provide Red Hat Directory Server, which is an
LDAPv3 compliant server. The base packages include the Lightweight
Directory Access Protocol (LDAP) server and command-line utilities for
server administration.

A flaw was found in the way the 389 Directory Server daemon (ns-slapd)
handled access control instructions (ACIs) using certificate groups. If an
LDAP user that had a certificate group defined attempted to bind to the
directory server, it would cause ns-slapd to enter an infinite loop and
consume an excessive amount of CPU time. (CVE-2012-0833)

Red Hat would like to thank Graham Leggett for reporting this issue.

This update also fixes the following bugs:

* Search with a complex filter that included a range search filter was
slow. (BZ#853004)

* If the server was restarted, or there was some type of connection
failure, it was possible that users were no longer able to log into the
console. Manual action is required to apply this fix: You must add an aci
to each "cn=Server Group" entry in "o=netscaperoot", that allows
anonymous/all users read/search rights. (BZ#856089)

* With replication enabled, trying to replace an existing value, where the
new value only differs in case (for example, changing "cn: foo" to "cn:
FOO"), resulted in the operation failing with an error 20. (BZ#891866)

All users of Red Hat Directory Server 8.2 should upgrade to these updated
packages, which resolve these issues.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at

5. Bugs fixed (

787014 - CVE-2012-0833 389: denial of service when using certificate groups

6. Package List:

Red Hat Directory Server 8 (for RHEL 5 Server):




These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from

7. References:

8. Contact:

The Red Hat security contact is <>.  More contact
details at

Copyright 2013 Red Hat, Inc.
Version: GnuPG v1.4.4 (GNU/Linux)


RHSA-announce mailing list

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC