It was discovered that an anonymous (or bound) LDAP request to the 389 Directory Server could trigger a crash of the server when handling LDAP V3 control data. If a malicious unauthenticated user were to send an LDAP request containing crafted LDAPv3 control data, they could cause the server to crash, denying service to the directory.
This issue was discovered by Thierry Bordaz of Red Hat.
Created attachment 701393 [details]
revised git patch file (389-ds-base-1.2.11)
Thanks to Rich for his comments. I modified the previous patch, which keeps the original order.
This issue has been addressed in following products:
Red Hat Enterprise Linux 6
Via RHSA-2013:0628 https://rhn.redhat.com/errata/RHSA-2013-0628.html
This was fixed upstream here:
Created 389-ds-base tracking bugs for this issue
Affects: epel-5 [bug 920325]
Affects: fedora-all [bug 920326]