{"id":"CVE-2018-14648","details":"A flaw was found in 389 Directory Server. A specially crafted search query could lead to excessive CPU consumption in the do_search() function. An unauthenticated attacker could use this flaw to provoke a denial of service.","modified":"2026-04-16T06:16:56.458987677Z","published":"2018-09-28T13:29:00.283Z","related":["SUSE-SU-2019:2155-1","openSUSE-SU-2024:10593-1"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3127"},{"type":"ADVISORY","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14648"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00015.html"},{"type":"REPORT","url":"https://access.redhat.com/errata/RHSA-2018:3507"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-14648.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"1.4.0.17"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}