{ "CVE_data_meta" : { "ASSIGNER" : "lpardo@redhat.com", "ID" : "CVE-2018-10850", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "389-ds-base", "version" : { "version_data" : [ { "version_value" : "389-ds-base 1.4.0.10" }, { "version_value" : "389-ds-base 1.3.8.3" } ] } } ] }, "vendor_name" : "[UNKNOWN]" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "389-ds-base before versions 1.4.0.10, 1.3.8.3 is vulnerable to a race condition in the way 389-ds-base handles persistent search, resulting in a crash if the server is under load. An anonymous attacker could use this flaw to trigger a denial of service." } ] }, "impact" : { "cvss" : [ [ { "vectorString" : "5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version" : "3.0" } ] ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "CWE-362" } ] } ] }, "references" : { "reference_data" : [ { "name" : "[debian-lts-announce] 20180715 [SECURITY] [DLA 1428-1] 389-ds-base security update", "refsource" : "MLIST", "url" : "https://lists.debian.org/debian-lts-announce/2018/07/msg00018.html" }, { "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10850", "refsource" : "CONFIRM", "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10850" }, { "name" : "https://pagure.io/389-ds-base/c/8f04487f99a", "refsource" : "CONFIRM", "url" : "https://pagure.io/389-ds-base/c/8f04487f99a" }, { "name" : "https://pagure.io/389-ds-base/issue/49768", "refsource" : "CONFIRM", "url" : "https://pagure.io/389-ds-base/issue/49768" }, { "name" : "RHSA-2018:2757", "refsource" : "REDHAT", "url" : "https://access.redhat.com/errata/RHSA-2018:2757" } ] } }