Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5953: Improper Validation of Consistency within Input

0
Medium
VulnerabilityCVE-2024-5953cvecve-2024-5953
Published: Tue Jun 18 2024 (06/18/2024, 10:01:56 UTC)
Source: CVE Database V5

Description

A denial of service vulnerability was found in the 389-ds-base LDAP server. This issue may allow an authenticated user to cause a server denial of service while attempting to log in with a user with a malformed hash in their password.

AI-Powered Analysis

AILast updated: 11/04/2025, 01:00:03 UTC

Technical Analysis

CVE-2024-5953 is a denial of service (DoS) vulnerability identified in the 389-ds-base LDAP server, a widely used open-source directory server implementation. The flaw arises from improper validation of consistency within input, specifically related to password hashes during login attempts. An authenticated user can exploit this vulnerability by attempting to authenticate with a user account that contains a malformed password hash. This malformed input triggers a failure in the server’s processing logic, causing the LDAP server to crash or become unresponsive, resulting in denial of service. The vulnerability does not expose any confidential data nor does it allow modification of data, but it impacts the availability of the LDAP service, which is critical for authentication and directory services in many enterprise environments. The CVSS 3.1 base score of 5.7 reflects that the attack vector is adjacent network (AV:A), requires low attack complexity (AC:L), and privileges (PR:L) but no user interaction (UI:N). The scope is unchanged (S:U), and the impact is limited to availability (A:H) with no confidentiality or integrity impact. No known exploits have been reported in the wild as of the publication date. The vulnerability was assigned and published by Red Hat, indicating it affects Red Hat’s distribution of 389 Directory Server, but other distributions using the same codebase may also be vulnerable. The lack of patch links suggests that fixes may be pending or available through vendor advisories.

Potential Impact

For European organizations, the primary impact is disruption of LDAP authentication services, which can halt access to critical applications and systems relying on centralized directory services. This can affect user productivity, delay business operations, and potentially cause cascading failures in dependent systems. Organizations in sectors with high reliance on LDAP for identity management—such as government, finance, healthcare, and telecommunications—may experience significant operational impact. Since the attack requires authentication, insider threats or compromised credentials could be leveraged to trigger the DoS. The availability impact could also be exploited as part of a broader attack to cause service outages or to distract security teams. However, the lack of confidentiality or integrity impact limits the risk of data breaches or unauthorized data modification. The medium severity rating suggests that while the threat is serious, it is not critical, but still warrants timely remediation to maintain service continuity.

Mitigation Recommendations

European organizations should first verify if they are running vulnerable versions of the 389-ds-base LDAP server, particularly Red Hat distributions or other Linux variants using this software. Immediate mitigation includes applying vendor patches or updates once available. In the absence of patches, organizations can implement strict monitoring of LDAP authentication logs to detect anomalous login attempts involving malformed password hashes. Limiting the number of failed login attempts and enforcing strong password policies can reduce the risk of exploitation. Network segmentation and access controls should restrict LDAP server access to trusted internal networks and authenticated users only. Additionally, deploying rate limiting or connection throttling on LDAP servers can help mitigate DoS attempts. Regular backups and failover configurations for directory services can minimize downtime in case of an attack. Finally, educating administrators about this vulnerability and ensuring incident response plans include LDAP service disruptions will improve preparedness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-06-13T04:20:35.951Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69091a47c28fd46ded81cf15

Added to database: 11/3/2025, 9:10:31 PM

Last enriched: 11/4/2025, 1:00:03 AM

Last updated: 11/5/2025, 2:03:34 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats