{"id":"USN-5231-1","summary":"389-ds-base vulnerabilities","details":"It was discovered that 389 Directory Server presented to users, during\nauthentication, an error message which could be used to discover if a\ncertain LDAP DN existed or not. A remote unauthenticated attacker could\npossibly use this to check the existence of an entry in a LDAP database\nand expose sensitive information. This issue affected only Ubuntu 20.04\nESM. (CVE-2020-35518)\n\nIt was discovered that 389 Directory Server was incorrectly validating\ndata used to access memory addresses. An authenticated attacker using a\nSyncrepl client could use this issue with a specially crafted query to\ncause 389 Directory Server to crash, resulting in a denial of service.\n(CVE-2021-3514)\n","modified":"2026-02-10T04:42:25Z","published":"2022-07-18T10:09:50Z","related":["UBUNTU-CVE-2020-35518","UBUNTU-CVE-2021-3514"],"upstream":["CVE-2020-35518","CVE-2021-3514","UBUNTU-CVE-2020-35518","UBUNTU-CVE-2021-3514"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5231-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-35518"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3514"}],"affected":[{"package":{"name":"389-ds-base","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/389-ds-base@1.3.4.9-1ubuntu0.1~esm1?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.3.4.9-1ubuntu0.1~esm1"}]}],"versions":["1.3.3.12-1build1","1.3.3.13-1","1.3.4.5-2","1.3.4.8-1","1.3.4.8-3","1.3.4.8-3ubuntu1","1.3.4.8-4","1.3.4.9-1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_version":"1.3.4.9-1ubuntu0.1~esm1","binary_name":"389-ds"},{"binary_version":"1.3.4.9-1ubuntu0.1~esm1","binary_name":"389-ds-base"},{"binary_version":"1.3.4.9-1ubuntu0.1~esm1","binary_name":"389-ds-base-dev"},{"binary_version":"1.3.4.9-1ubuntu0.1~esm1","binary_name":"389-ds-base-libs"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-3514"}],"ecosystem":"Ubuntu:Pro:16.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5231-1.json"}},{"package":{"name":"389-ds-base","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/389-ds-base@1.3.7.10-1ubuntu1+esm1?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.3.7.10-1ubuntu1+esm1"}]}],"versions":["1.3.7.5-1","1.3.7.5-1build1","1.3.7.5-1build2","1.3.7.9-1","1.3.7.10-1","1.3.7.10-1ubuntu1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_version":"1.3.7.10-1ubuntu1+esm1","binary_name":"389-ds"},{"binary_version":"1.3.7.10-1ubuntu1+esm1","binary_name":"389-ds-base"},{"binary_version":"1.3.7.10-1ubuntu1+esm1","binary_name":"389-ds-base-dev"},{"binary_version":"1.3.7.10-1ubuntu1+esm1","binary_name":"389-ds-base-libs"},{"binary_version":"1.3.7.10-1ubuntu1+esm1","binary_name":"python3-dirsrvtests"},{"binary_version":"1.3.7.10-1ubuntu1+esm1","binary_name":"python3-lib389"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-3514"}],"ecosystem":"Ubuntu:Pro:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5231-1.json"}},{"package":{"name":"389-ds-base","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/389-ds-base@1.4.3.6-2ubuntu0.1~esm1?arch=source&distro=esm-apps/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.3.6-2ubuntu0.1~esm1"}]}],"versions":["1.4.1.6-4","1.4.1.6-4build1","1.4.2.4-1","1.4.2.4-1build1","1.4.3.2-1","1.4.3.2-1build1","1.4.3.6-2"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_version":"1.4.3.6-2ubuntu0.1~esm1","binary_name":"389-ds"},{"binary_version":"1.4.3.6-2ubuntu0.1~esm1","binary_name":"389-ds-base"},{"binary_version":"1.4.3.6-2ubuntu0.1~esm1","binary_name":"389-ds-base-dev"},{"binary_version":"1.4.3.6-2ubuntu0.1~esm1","binary_name":"389-ds-base-libs"},{"binary_version":"1.4.3.6-2ubuntu0.1~esm1","binary_name":"cockpit-389-ds"},{"binary_version":"1.4.3.6-2ubuntu0.1~esm1","binary_name":"python3-lib389"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-35518"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-3514"}],"ecosystem":"Ubuntu:Pro:20.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5231-1.json"}}],"schema_version":"1.7.3"}