{
  "threat_severity" : "Moderate",
  "public_date" : "2024-06-13T00:00:00Z",
  "bugzilla" : {
    "description" : "389-ds-base: Malformed userPassword hash may cause Denial of Service",
    "id" : "2292104",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2292104"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.7",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-1288",
  "details" : [ "A denial of service vulnerability was found in the 389-ds-base LDAP server. This issue may allow an authenticated user to cause a server denial of service while attempting to log in with a user with a malformed hash in their password.", "A denial of service vulnerability was found in the 389-ds-base LDAP server. This issue may allow an authenticated user to cause a server denial of service while attempting to log in with a user with a malformed hash in their password." ],
  "statement" : "LDAP servers are not usually exposed to the open internet, requiring adjacent connectivity for a successful attack. This issue also requires a compromised user account to perform the attack. Therefore, this flaw is rated as a Moderate severity.",
  "acknowledgement" : "This issue was discovered by Têko Mihinto (Red Hat).",
  "affected_release" : [ {
    "product_name" : "Red Hat Directory Server 11.5 E4S for RHEL 8",
    "release_date" : "2025-02-18T00:00:00Z",
    "advisory" : "RHSA-2025:1632",
    "cpe" : "cpe:/a:redhat:directory_server_e4s:11.5::el8",
    "package" : "redhat-ds:11-8060020250210084424.0ca98e7e"
  }, {
    "product_name" : "Red Hat Directory Server 11.7 for RHEL 8",
    "release_date" : "2024-09-11T00:00:00Z",
    "advisory" : "RHSA-2024:6576",
    "cpe" : "cpe:/a:redhat:directory_server:11.7::el8",
    "package" : "redhat-ds:11-8080020240909040333.f969626e"
  }, {
    "product_name" : "Red Hat Directory Server 11.9 for RHEL 8",
    "release_date" : "2024-09-11T00:00:00Z",
    "advisory" : "RHSA-2024:6568",
    "cpe" : "cpe:/a:redhat:directory_server:11.9::el8",
    "package" : "redhat-ds:11-8100020240902112955.37ed7c03"
  }, {
    "product_name" : "Red Hat Directory Server 12.2 EUS for RHEL 9",
    "release_date" : "2024-10-01T00:00:00Z",
    "advisory" : "RHSA-2024:7458",
    "cpe" : "cpe:/a:redhat:directory_server_eus:12.2::el9",
    "package" : "redhat-ds:12-9020020240916150035.1674d574"
  }, {
    "product_name" : "Red Hat Directory Server 12.4 for RHEL 9",
    "release_date" : "2024-08-06T00:00:00Z",
    "advisory" : "RHSA-2024:4997",
    "cpe" : "cpe:/a:redhat:directory_server:12.4::el9",
    "package" : "redhat-ds:12-9040020240723122852.1674d574"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7 Extended Lifecycle Support",
    "release_date" : "2024-09-03T00:00:00Z",
    "advisory" : "RHSA-2024:6153",
    "cpe" : "cpe:/o:redhat:rhel_els:7",
    "package" : "389-ds-base-0:1.3.11.1-6.el7_9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2024-09-11T00:00:00Z",
    "advisory" : "RHSA-2024:6569",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "389-ds:1.4-8100020240910065753.25e700aa"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.8 Extended Update Support",
    "release_date" : "2024-08-21T00:00:00Z",
    "advisory" : "RHSA-2024:5690",
    "cpe" : "cpe:/a:redhat:rhel_eus:8.8",
    "package" : "389-ds:1.4-8080020240807050952.6dbb3803"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-08-12T00:00:00Z",
    "advisory" : "RHSA-2024:5192",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "389-ds-base-0:2.4.5-9.el9_4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.2 Extended Update Support",
    "release_date" : "2024-07-18T00:00:00Z",
    "advisory" : "RHSA-2024:4633",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.2",
    "package" : "389-ds-base-0:2.2.4-9.el9_2"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "389-ds-base",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "389-ds-base",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2024-5953\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-5953" ],
  "name" : "CVE-2024-5953",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}