2025-04-11 02:06:08 +00:00

195 lines
7.3 KiB
JSON

{
"id": "CVE-2010-4746",
"sourceIdentifier": "cve@mitre.org",
"published": "2011-02-23T19:00:01.217",
"lastModified": "2025-04-11T00:51:21.963",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple memory leaks in the normalization functionality in 389 Directory Server before 1.2.7.5 allow remote attackers to cause a denial of service (memory consumption) via \"badly behaved applications,\" related to (1) Slapi_Attr mishandling in the DN normalization code and (2) pointer mishandling in the syntax normalization code, a different issue than CVE-2011-0019."
},
{
"lang": "es",
"value": "m\u00faltiples p\u00e9rdidas de memoria en la funcionalidad de la normalizaci\u00f3n en 389 Directory Server anteriores a v1.2.7.5 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de memoria) a trav\u00e9s de \"mal comportamiento aplicaciones\", relacionado con (1) mal uso del c\u00f3digo Slapi_Attr en la normalizaci\u00f3n DN y (2) mala gesti\u00f3n del puntero en la sintaxis del c\u00f3digo de normalizaci\u00f3n, diferente a CVE-2011-0019."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-399"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fedoraproject:389_directory_server:*:alpha3:*:*:*:*:*:*",
"versionEndIncluding": "1.2.7",
"matchCriteriaId": "28287804-0CCD-464F-90B6-6A6FE10E1B84"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CE2E9C8D-FFEE-424C-BBA6-42BD4309D18A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8F2E9CEF-F30D-4374-A7E2-052102B602A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "16A8729B-B00B-4871-B083-6B10A5034721"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6335FA65-9498-40AF-AE2B-034DA2823821"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8CF92ADB-B5B0-43D7-93D8-CBA3AE46EB8D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc2:*:*:*:*:*:*",
"matchCriteriaId": "17F8ED59-E27A-4B9B-8BB8-66FAB2B2DCFB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc3:*:*:*:*:*:*",
"matchCriteriaId": "4200CEAB-4E14-48C8-9D6F-F86796475019"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc4:*:*:*:*:*:*",
"matchCriteriaId": "3179916B-F98C-4D10-82AB-59DCCACBE8DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B44B5289-08BB-4D62-B60D-1BD738472B1D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a2:*:*:*:*:*:*",
"matchCriteriaId": "02392BBF-AFAB-4739-BAF6-E930692AB28F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a3:*:*:*:*:*:*",
"matchCriteriaId": "BFF70436-E01E-4912-AC31-B600F5E8CB4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a4:*:*:*:*:*:*",
"matchCriteriaId": "360BA51B-B47E-4537-B564-9E628DF4E6EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "987F04BC-75DC-4959-AE32-070F11F9EBC2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc2:*:*:*:*:*:*",
"matchCriteriaId": "078BCE55-90BB-48DE-92D1-9A152338158C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc3:*:*:*:*:*:*",
"matchCriteriaId": "595F5AEE-E4A9-40E0-AF03-69AF689C4916"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc6:*:*:*:*:*:*",
"matchCriteriaId": "FED47519-F254-4545-8551-FFBD0B4F9FAB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc7:*:*:*:*:*:*",
"matchCriteriaId": "A06C0421-74B7-4F9D-9F3A-18BF62BDD4D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "83F772DF-B8A7-4577-9AC6-3234B8C7FFAA"
}
]
}
]
}
],
"references": [
{
"url": "http://directory.fedoraproject.org/wiki/Release_Notes",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=663597",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://directory.fedoraproject.org/wiki/Release_Notes",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=663597",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}