{
  "threat_severity" : "Moderate",
  "public_date" : "2024-01-30T00:00:00Z",
  "bugzilla" : {
    "description" : "389-ds-base: a heap overflow leading to denail-of-servce while writing a value larger than 256 chars (in log_entry_attr)",
    "id" : "2261879",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2261879"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-122",
  "details" : [ "A heap overflow flaw was found in 389-ds-base. This issue leads to a denial of service when writing a value larger than 256 chars in log_entry_attr.", "A heap overflow flaw was found in 389-ds-base. This issue leads to a denial of service when writing a value larger than 256 chars in log_entry_attr." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Directory Server 11.5 E4S for RHEL 8",
    "release_date" : "2025-02-18T00:00:00Z",
    "advisory" : "RHSA-2025:1632",
    "cpe" : "cpe:/a:redhat:directory_server_e4s:11.5::el8",
    "package" : "redhat-ds:11-8060020250210084424.0ca98e7e"
  }, {
    "product_name" : "Red Hat Directory Server 11.7 for RHEL 8",
    "release_date" : "2024-03-19T00:00:00Z",
    "advisory" : "RHSA-2024:1372",
    "cpe" : "cpe:/a:redhat:directory_server:11.7::el8",
    "package" : "redhat-ds:11-8080020240306153507.f969626e"
  }, {
    "product_name" : "Red Hat Directory Server 11.8 for RHEL 8",
    "release_date" : "2024-07-02T00:00:00Z",
    "advisory" : "RHSA-2024:4209",
    "cpe" : "cpe:/a:redhat:directory_server:11.8::el8",
    "package" : "redhat-ds:11-8090020240606122459.91529cd0"
  }, {
    "product_name" : "Red Hat Directory Server 12.2 EUS for RHEL 9",
    "release_date" : "2024-10-01T00:00:00Z",
    "advisory" : "RHSA-2024:7458",
    "cpe" : "cpe:/a:redhat:directory_server_eus:12.2::el9",
    "package" : "redhat-ds:12-9020020240916150035.1674d574"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2024-05-22T00:00:00Z",
    "advisory" : "RHSA-2024:3047",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "389-ds:1.4-8100020240315011748.945b6f6d"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Extended Update Support",
    "release_date" : "2024-03-05T00:00:00Z",
    "advisory" : "RHSA-2024:1074",
    "cpe" : "cpe:/a:redhat:rhel_eus:8.6",
    "package" : "389-ds:1.4-8060020240213164457.824efc52"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.8 Extended Update Support",
    "release_date" : "2024-08-21T00:00:00Z",
    "advisory" : "RHSA-2024:5690",
    "cpe" : "cpe:/a:redhat:rhel_eus:8.8",
    "package" : "389-ds:1.4-8080020240807050952.6dbb3803"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.2 Extended Update Support",
    "release_date" : "2024-07-18T00:00:00Z",
    "advisory" : "RHSA-2024:4633",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.2",
    "package" : "389-ds-base-0:2.2.4-9.el9_2"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Directory Server 12",
    "fix_state" : "Affected",
    "package_name" : "redhat-ds:12/389-ds-base",
    "cpe" : "cpe:/a:redhat:directory_server:12"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "389-ds-base",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "389-ds-base",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Affected",
    "package_name" : "389-ds-base",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2024-1062\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-1062\nhttps://bugzilla.redhat.com/show_bug.cgi?id=2256711" ],
  "name" : "CVE-2024-1062",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}