FKIE_CVE-2008-2943
Vulnerability from fkie_nvd - Published: 2008-06-30 21:41 - Updated: 2026-04-23 00:35
Severity ?
Summary
Double free vulnerability in IBM Tivoli Directory Server (TDS) 6.1.0.0 through 6.1.0.15 allows remote authenticated administrators to cause a denial of service (ABEND) and possibly execute arbitrary code by using ldapadd to attempt to create a duplicate ibm-globalAdminGroup LDAP database entry. NOTE: the vendor states "There is no real risk of a vulnerability," although there are likely scenarios in which a user is allowed to make administrative LDAP requests but does not have the privileges to stop the server.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| ibm | tivoli_directory_server | 6.1.0.0 | |
| ibm | tivoli_directory_server | 6.1.0.1 | |
| ibm | tivoli_directory_server | 6.1.0.2 | |
| ibm | tivoli_directory_server | 6.1.0.3 | |
| ibm | tivoli_directory_server | 6.1.0.4 | |
| ibm | tivoli_directory_server | 6.1.0.5 | |
| ibm | tivoli_directory_server | 6.1.0.6 | |
| ibm | tivoli_directory_server | 6.1.0.7 | |
| ibm | tivoli_directory_server | 6.1.0.8 | |
| ibm | tivoli_directory_server | 6.1.0.9 | |
| ibm | tivoli_directory_server | 6.1.0.10 | |
| ibm | tivoli_directory_server | 6.1.0.11 | |
| ibm | tivoli_directory_server | 6.1.0.12 | |
| ibm | tivoli_directory_server | 6.1.0.13 | |
| ibm | tivoli_directory_server | 6.1.0.14 | |
| ibm | tivoli_directory_server | 6.1.0.15 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2F468434-0317-435A-B2A6-5923A88A090F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E79197BC-3BDF-4F38-B63F-1B2A658B645F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F7B1402A-B3C3-4210-928F-6EFCCE2DE1CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "92D48F0B-C9E2-4381-8463-83FF47136EB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "36308D0C-D92C-4857-A857-097F383EE76C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A84CEB80-796F-4928-A2A0-73E604543A70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "462385FC-F345-42EE-ABF0-E1781CC648A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "F10F3910-5616-41A2-A3BF-18FA4DD68631",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "51C34738-5F9B-43A7-987F-EB805B31119E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "6AA93B63-9D15-4784-8585-DBC139A382E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "55D84E30-1F23-4A6A-B622-78DBEEBEFB46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "50C9A7DF-6968-41CC-911A-B746CB43AA82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "0EA493E1-F791-4FE5-9F7E-36CAC0D942C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "F7365156-4EA3-476A-A395-FADEDF1BA80A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "321B15BC-2653-4B64-A5AE-9FCA6A08713C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "5A1B527B-E07D-4543-92A6-0EE58CB8FECC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Double free vulnerability in IBM Tivoli Directory Server (TDS) 6.1.0.0 through 6.1.0.15 allows remote authenticated administrators to cause a denial of service (ABEND) and possibly execute arbitrary code by using ldapadd to attempt to create a duplicate ibm-globalAdminGroup LDAP database entry. NOTE: the vendor states \"There is no real risk of a vulnerability,\" although there are likely scenarios in which a user is allowed to make administrative LDAP requests but does not have the privileges to stop the server."
},
{
"lang": "es",
"value": "Vulnerabilidad de doble libreaci\u00f3n en IBM Tivoli Directory Server (TDS) 6.1.0.0 hasta 6.1.0.15 que permite a los administradores la autenticaci\u00f3n remota para causar una denegaci\u00f3n de servicios (ABEND) y posiblemente ejecutar c\u00f3dico arbitrario utilizando ldapadd para conseguir crear un duplicado en la base de datos de entrada ibm-globalAdminGroup LDAP.\r\nNOTA: el vendedor declara \"no hya un riesgo real de vulnerabilidad\", aunque hay posibles escenarios en los que un usuario puede hacer peticiones al LDAP administrativo pero no tiene privilegios para parar el servidor"
}
],
"id": "CVE-2008-2943",
"lastModified": "2026-04-23T00:35:47.467",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-06-30T21:41:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30786"
},
{
"source": "cve@mitre.org",
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IO09113"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/30010"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2008/1970"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43465"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30786"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IO09113"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/30010"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/1970"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43465"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…