It was discovered that an anonymous (or bound) LDAP request to the 389 Directory Server could trigger a crash of the server when handling LDAP V3 control data. If a malicious unauthenticated user were to send an LDAP request containing crafted LDAPv3 control data, they could cause the server to crash, denying service to the directory.
Acknowledgements: This issue was discovered by Thierry Bordaz of Red Hat.
Created attachment 701393 [details] revised git patch file (389-ds-base-1.2.11) Thanks to Rich for his comments. I modified the previous patch, which keeps the original order.
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2013:0628 https://rhn.redhat.com/errata/RHSA-2013-0628.html
This was fixed upstream here: http://git.fedorahosted.org/cgit/389/ds.git/commit/?id=ae13e448abb0ce1dd97f0446b89d774030d9474b
Created 389-ds-base tracking bugs for this issue Affects: epel-5 [bug 920325] Affects: fedora-all [bug 920326]