Vulnerabilites related to openldap - openldap
CVE-2017-9287 (GCVE-0-2017-9287)
Vulnerability from cvelistv5
Published
2017-05-29 16:00
Modified
2024-08-05 17:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
servers/slapd/back-mdb/search.c in OpenLDAP through 2.4.44 is prone to a double free vulnerability. A user with access to search the directory can crash slapd by issuing a search including the Paged Results control with a page size of 0.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T17:02:44.147Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "98736", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/98736" }, { "name": "DSA-3868", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2017/dsa-3868" }, { "name": "RHSA-2017:1852", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1852" }, { "name": "1038591", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038591" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/its/?findid=8655" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.debian.org/863563" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-05-29T00:00:00", "descriptions": [ { "lang": "en", "value": "servers/slapd/back-mdb/search.c in OpenLDAP through 2.4.44 is prone to a double free vulnerability. A user with access to search the directory can crash slapd by issuing a search including the Paged Results control with a page size of 0." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T23:19:17", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "98736", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/98736" }, { "name": "DSA-3868", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2017/dsa-3868" }, { "name": "RHSA-2017:1852", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1852" }, { "name": "1038591", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038591" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/its/?findid=8655" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.debian.org/863563" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-9287", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "servers/slapd/back-mdb/search.c in OpenLDAP through 2.4.44 is prone to a double free vulnerability. A user with access to search the directory can crash slapd by issuing a search including the Paged Results control with a page size of 0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "98736", "refsource": "BID", "url": "http://www.securityfocus.com/bid/98736" }, { "name": "DSA-3868", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3868" }, { "name": "RHSA-2017:1852", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1852" }, { "name": "1038591", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038591" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" }, { "name": "http://www.openldap.org/its/?findid=8655", "refsource": "CONFIRM", "url": "http://www.openldap.org/its/?findid=8655" }, { "name": "https://bugs.debian.org/863563", "refsource": "CONFIRM", "url": "https://bugs.debian.org/863563" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-9287", "datePublished": "2017-05-29T16:00:00", "dateReserved": "2017-05-29T00:00:00", "dateUpdated": "2024-08-05T17:02:44.147Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2001-0977 (GCVE-0-2001-0977)
Vulnerability from cvelistv5
Published
2002-06-25 04:00
Modified
2024-08-08 04:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
slapd in OpenLDAP 1.x before 1.2.12, and 2.x before 2.0.8, allows remote attackers to cause a denial of service (crash) via an invalid Basic Encoding Rules (BER) length field.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:37:07.240Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "CA-2001-18", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.cert.org/advisories/CA-2001-18.html" }, { "name": "1905", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/1905" }, { "name": "RHSA-2001:098", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2001-098.html" }, { "name": "DSA-068", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2001/dsa-068" }, { "name": "MDKSA-2001:069", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-069.php3" }, { "name": "VU#935800", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/935800" }, { "name": "3049", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3049" }, { "name": "CLA-2001:417", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000417" }, { "name": "openldap-ldap-protos-dos(6904)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6904" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-07-16T00:00:00", "descriptions": [ { "lang": "en", "value": "slapd in OpenLDAP 1.x before 1.2.12, and 2.x before 2.0.8, allows remote attackers to cause a denial of service (crash) via an invalid Basic Encoding Rules (BER) length field." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-02-06T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "CA-2001-18", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.cert.org/advisories/CA-2001-18.html" }, { "name": "1905", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/1905" }, { "name": "RHSA-2001:098", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2001-098.html" }, { "name": "DSA-068", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2001/dsa-068" }, { "name": "MDKSA-2001:069", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-069.php3" }, { "name": "VU#935800", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/935800" }, { "name": "3049", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3049" }, { "name": "CLA-2001:417", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000417" }, { "name": "openldap-ldap-protos-dos(6904)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6904" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0977", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "slapd in OpenLDAP 1.x before 1.2.12, and 2.x before 2.0.8, allows remote attackers to cause a denial of service (crash) via an invalid Basic Encoding Rules (BER) length field." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "CA-2001-18", "refsource": "CERT", "url": "http://www.cert.org/advisories/CA-2001-18.html" }, { "name": "1905", "refsource": "OSVDB", "url": "http://www.osvdb.org/1905" }, { "name": "RHSA-2001:098", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2001-098.html" }, { "name": "DSA-068", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2001/dsa-068" }, { "name": "MDKSA-2001:069", "refsource": "MANDRAKE", "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-069.php3" }, { "name": "VU#935800", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/935800" }, { "name": "3049", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3049" }, { "name": "CLA-2001:417", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000417" }, { "name": "openldap-ldap-protos-dos(6904)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6904" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-0977", "datePublished": "2002-06-25T04:00:00", "dateReserved": "2002-01-31T00:00:00", "dateUpdated": "2024-08-08T04:37:07.240Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-4600 (GCVE-0-2006-4600)
Vulnerability from cvelistv5
Published
2006-09-07 00:00
Modified
2024-08-07 19:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
slapd in OpenLDAP before 2.3.25 allows remote authenticated users with selfwrite Access Control List (ACL) privileges to modify arbitrary Distinguished Names (DN).
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:14:47.800Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-232.htm" }, { "name": "22300", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22300" }, { "name": "20070920 VMSA-2007-0006 Critical security updates for all supported versions of VMware ESX Server, VMware Server, VMware Workstation, VMware ACE, and VMware Player", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html" }, { "name": "MDKSA-2006:171", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:171" }, { "name": "25098", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25098" }, { "name": "GLSA-200711-23", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200711-23.xml" }, { "name": "25894", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25894" }, { "name": "[openldap-announce] 20060801 OpenLDAP 2.3.25 available", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openldap.org/lists/openldap-announce/200608/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-667" }, { "name": "ADV-2007-3229", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3229" }, { "name": "2006-0055", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2006/0055" }, { "name": "20060929 rPSA-2006-0176-1 openldap openldap-clients openldap-servers", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/447395/100/200/threaded" }, { "name": "22273", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22273" }, { "name": "25628", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25628" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4587" }, { "name": "RHSA-2007:0430", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0430.html" }, { "name": "ADV-2007-2186", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2186" }, { "name": "openldap-selfwrite-security-bypass(28772)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28772" }, { "name": "oval:org.mitre.oval:def:9618", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9618" }, { "name": "19832", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19832" }, { "name": "RHSA-2007:0310", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0310.html" }, { "name": "26909", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26909" }, { "name": "27706", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27706" }, { "name": "1016783", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016783" }, { "name": "20070602-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/software/release/changes.html" }, { "name": "22219", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22219" }, { "name": "25676", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25676" }, { "name": "21721", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21721" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-08-01T00:00:00", "descriptions": [ { "lang": "en", "value": "slapd in OpenLDAP before 2.3.25 allows remote authenticated users with selfwrite Access Control List (ACL) privileges to modify arbitrary Distinguished Names (DN)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-232.htm" }, { "name": "22300", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22300" }, { "name": "20070920 VMSA-2007-0006 Critical security updates for all supported versions of VMware ESX Server, VMware Server, VMware Workstation, VMware ACE, and VMware Player", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html" }, { "name": "MDKSA-2006:171", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:171" }, { "name": "25098", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25098" }, { "name": "GLSA-200711-23", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200711-23.xml" }, { "name": "25894", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25894" }, { "name": "[openldap-announce] 20060801 OpenLDAP 2.3.25 available", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openldap.org/lists/openldap-announce/200608/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-667" }, { "name": "ADV-2007-3229", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3229" }, { "name": "2006-0055", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2006/0055" }, { "name": "20060929 rPSA-2006-0176-1 openldap openldap-clients openldap-servers", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/447395/100/200/threaded" }, { "name": "22273", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22273" }, { "name": "25628", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25628" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4587" }, { "name": "RHSA-2007:0430", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0430.html" }, { "name": "ADV-2007-2186", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2186" }, { "name": "openldap-selfwrite-security-bypass(28772)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28772" }, { "name": "oval:org.mitre.oval:def:9618", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9618" }, { "name": "19832", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19832" }, { "name": "RHSA-2007:0310", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0310.html" }, { "name": "26909", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26909" }, { "name": "27706", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27706" }, { "name": "1016783", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016783" }, { "name": "20070602-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/software/release/changes.html" }, { "name": "22219", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22219" }, { "name": "25676", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25676" }, { "name": "21721", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21721" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-4600", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "slapd in OpenLDAP before 2.3.25 allows remote authenticated users with selfwrite Access Control List (ACL) privileges to modify arbitrary Distinguished Names (DN)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://support.avaya.com/elmodocs2/security/ASA-2007-232.htm", "refsource": "CONFIRM", "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-232.htm" }, { "name": "22300", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22300" }, { "name": "20070920 VMSA-2007-0006 Critical security updates for all supported versions of VMware ESX Server, VMware Server, VMware Workstation, VMware ACE, and VMware Player", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html" }, { "name": "MDKSA-2006:171", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:171" }, { "name": "25098", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25098" }, { "name": "GLSA-200711-23", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200711-23.xml" }, { "name": "25894", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25894" }, { "name": "[openldap-announce] 20060801 OpenLDAP 2.3.25 available", "refsource": "MLIST", "url": "http://www.openldap.org/lists/openldap-announce/200608/msg00000.html" }, { "name": "https://issues.rpath.com/browse/RPL-667", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-667" }, { "name": "ADV-2007-3229", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3229" }, { "name": "2006-0055", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2006/0055" }, { "name": "20060929 rPSA-2006-0176-1 openldap openldap-clients openldap-servers", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/447395/100/200/threaded" }, { "name": "22273", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22273" }, { "name": "25628", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25628" }, { "name": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4587", "refsource": "MISC", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4587" }, { "name": "RHSA-2007:0430", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0430.html" }, { "name": "ADV-2007-2186", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2186" }, { "name": "openldap-selfwrite-security-bypass(28772)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28772" }, { "name": "oval:org.mitre.oval:def:9618", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9618" }, { "name": "19832", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19832" }, { "name": "RHSA-2007:0310", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0310.html" }, { "name": "26909", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26909" }, { "name": "27706", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27706" }, { "name": "1016783", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016783" }, { "name": "20070602-01-P", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc" }, { "name": "http://www.openldap.org/software/release/changes.html", "refsource": "CONFIRM", "url": "http://www.openldap.org/software/release/changes.html" }, { "name": "22219", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22219" }, { "name": "25676", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25676" }, { "name": "21721", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21721" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-4600", "datePublished": "2006-09-07T00:00:00", "dateReserved": "2006-09-06T00:00:00", "dateUpdated": "2024-08-07T19:14:47.800Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-0212 (GCVE-0-2010-0212)
Vulnerability from cvelistv5
Published
2010-07-27 22:00
Modified
2024-08-07 00:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
OpenLDAP 2.4.22 allows remote attackers to cause a denial of service (crash) via a modrdn call with a zero-length RDN destination string, which is not properly handled by the smr_normalize function and triggers a NULL pointer dereference in the IA5StringNormalize function in schema_init.c, as demonstrated using the Codenomicon LDAPv3 test suite.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:37:54.267Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024221", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024221" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4435" }, { "name": "GLSA-201406-36", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6570" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0001.html" }, { "name": "ADV-2010-1858", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1858" }, { "name": "APPLE-SA-2010-11-10-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "name": "ADV-2010-1849", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1849" }, { "name": "41770", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/41770" }, { "name": "RHSA-2010:0542", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0542.html" }, { "name": "40687", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40687" }, { "name": "20110105 VMSA-2011-0001 VMware ESX third party updates for Service Console packages glibc, sudo, and openldap", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/515545/100/0/threaded" }, { "name": "SUSE-SR:2010:014", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "40639", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40639" }, { "name": "42787", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42787" }, { "name": "ADV-2011-0025", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0025" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10735" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-07-20T00:00:00", "descriptions": [ { "lang": "en", "value": "OpenLDAP 2.4.22 allows remote attackers to cause a denial of service (crash) via a modrdn call with a zero-length RDN destination string, which is not properly handled by the smr_normalize function and triggers a NULL pointer dereference in the IA5StringNormalize function in schema_init.c, as demonstrated using the Codenomicon LDAPv3 test suite." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "1024221", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024221" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4435" }, { "name": "GLSA-201406-36", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6570" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0001.html" }, { "name": "ADV-2010-1858", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1858" }, { "name": "APPLE-SA-2010-11-10-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "name": "ADV-2010-1849", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1849" }, { "name": "41770", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/41770" }, { "name": "RHSA-2010:0542", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0542.html" }, { "name": "40687", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40687" }, { "name": "20110105 VMSA-2011-0001 VMware ESX third party updates for Service Console packages glibc, sudo, and openldap", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/515545/100/0/threaded" }, { "name": "SUSE-SR:2010:014", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "40639", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40639" }, { "name": "42787", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42787" }, { "name": "ADV-2011-0025", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0025" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10735" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2010-0212", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenLDAP 2.4.22 allows remote attackers to cause a denial of service (crash) via a modrdn call with a zero-length RDN destination string, which is not properly handled by the smr_normalize function and triggers a NULL pointer dereference in the IA5StringNormalize function in schema_init.c, as demonstrated using the Codenomicon LDAPv3 test suite." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024221", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024221" }, { "name": "http://support.apple.com/kb/HT4435", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4435" }, { "name": "GLSA-201406-36", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "name": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6570", "refsource": "CONFIRM", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6570" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2011-0001.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0001.html" }, { "name": "ADV-2010-1858", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1858" }, { "name": "APPLE-SA-2010-11-10-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "name": "ADV-2010-1849", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1849" }, { "name": "41770", "refsource": "BID", "url": "http://www.securityfocus.com/bid/41770" }, { "name": "RHSA-2010:0542", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0542.html" }, { "name": "40687", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40687" }, { "name": "20110105 VMSA-2011-0001 VMware ESX third party updates for Service Console packages glibc, sudo, and openldap", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/515545/100/0/threaded" }, { "name": "SUSE-SR:2010:014", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "40639", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40639" }, { "name": "42787", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42787" }, { "name": "ADV-2011-0025", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0025" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10735", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10735" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2010-0212", "datePublished": "2010-07-27T22:00:00", "dateReserved": "2010-01-06T00:00:00", "dateUpdated": "2024-08-07T00:37:54.267Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-36229 (GCVE-0-2020-36229)
Vulnerability from cvelistv5
Published
2021-01-25 09:43
Modified
2024-08-04 17:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
A flaw was discovered in ldap_X509dn2bv in OpenLDAP before 2.4.57 leading to a slapd crash in the X.509 DN parsing in ad_keystring, resulting in denial of service.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:23:09.779Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9425" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/4bdfffd2889c0c5cdf58bebafbdc8fce4bb2bff0" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212529" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212531" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was discovered in ldap_X509dn2bv in OpenLDAP before 2.4.57 leading to a slapd crash in the X.509 DN parsing in ad_keystring, resulting in denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-29T14:09:06", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9425" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/4bdfffd2889c0c5cdf58bebafbdc8fce4bb2bff0" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212529" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212531" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-36229", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was discovered in ldap_X509dn2bv in OpenLDAP before 2.4.57 leading to a slapd crash in the X.509 DN parsing in ad_keystring, resulting in denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "name": "https://bugs.openldap.org/show_bug.cgi?id=9425", "refsource": "MISC", "url": "https://bugs.openldap.org/show_bug.cgi?id=9425" }, { "name": "https://git.openldap.org/openldap/openldap/-/commit/4bdfffd2889c0c5cdf58bebafbdc8fce4bb2bff0", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/commit/4bdfffd2889c0c5cdf58bebafbdc8fce4bb2bff0" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4845" }, { "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "name": "https://support.apple.com/kb/HT212529", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "name": "https://support.apple.com/kb/HT212531", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212531" }, { "name": "https://support.apple.com/kb/HT212530", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-36229", "datePublished": "2021-01-25T09:43:57", "dateReserved": "2021-01-25T00:00:00", "dateUpdated": "2024-08-04T17:23:09.779Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-0211 (GCVE-0-2010-0211)
Vulnerability from cvelistv5
Published
2010-07-27 22:00
Modified
2024-08-07 00:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:37:54.224Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024221", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024221" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4435" }, { "name": "GLSA-201406-36", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6570" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0001.html" }, { "name": "ADV-2010-1858", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1858" }, { "name": "40677", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40677" }, { "name": "APPLE-SA-2010-11-10-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "name": "ADV-2010-1849", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1849" }, { "name": "41770", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/41770" }, { "name": "RHSA-2010:0542", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0542.html" }, { "name": "40687", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40687" }, { "name": "20110105 VMSA-2011-0001 VMware ESX third party updates for Service Console packages glibc, sudo, and openldap", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/515545/100/0/threaded" }, { "name": "SUSE-SR:2010:014", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" }, { "name": "RHSA-2010:0543", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0543.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "40639", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40639" }, { "name": "42787", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42787" }, { "name": "ADV-2011-0025", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0025" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-07-20T00:00:00", "descriptions": [ { "lang": "en", "value": "The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "1024221", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024221" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4435" }, { "name": "GLSA-201406-36", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6570" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0001.html" }, { "name": "ADV-2010-1858", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1858" }, { "name": "40677", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40677" }, { "name": "APPLE-SA-2010-11-10-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "name": "ADV-2010-1849", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1849" }, { "name": "41770", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/41770" }, { "name": "RHSA-2010:0542", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0542.html" }, { "name": "40687", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40687" }, { "name": "20110105 VMSA-2011-0001 VMware ESX third party updates for Service Console packages glibc, sudo, and openldap", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/515545/100/0/threaded" }, { "name": "SUSE-SR:2010:014", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" }, { "name": "RHSA-2010:0543", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0543.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "40639", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40639" }, { "name": "42787", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42787" }, { "name": "ADV-2011-0025", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0025" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2010-0211", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024221", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024221" }, { "name": "http://support.apple.com/kb/HT4435", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4435" }, { "name": "GLSA-201406-36", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "name": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6570", "refsource": "CONFIRM", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6570" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2011-0001.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0001.html" }, { "name": "ADV-2010-1858", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1858" }, { "name": "40677", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40677" }, { "name": "APPLE-SA-2010-11-10-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "name": "ADV-2010-1849", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1849" }, { "name": "41770", "refsource": "BID", "url": "http://www.securityfocus.com/bid/41770" }, { "name": "RHSA-2010:0542", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0542.html" }, { "name": "40687", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40687" }, { "name": "20110105 VMSA-2011-0001 VMware ESX third party updates for Service Console packages glibc, sudo, and openldap", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/515545/100/0/threaded" }, { "name": "SUSE-SR:2010:014", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" }, { "name": "RHSA-2010:0543", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0543.html" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "40639", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40639" }, { "name": "42787", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42787" }, { "name": "ADV-2011-0025", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0025" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2010-0211", "datePublished": "2010-07-27T22:00:00", "dateReserved": "2010-01-06T00:00:00", "dateUpdated": "2024-08-07T00:37:54.224Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-25709 (GCVE-0-2020-25709)
Vulnerability from cvelistv5
Published
2021-05-18 11:51
Modified
2024-08-04 15:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Reachable Assertion
Summary
A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP’s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:40:36.594Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-4792", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4792" }, { "name": "[debian-lts-announce] 20201204 [SECURITY] [DLA 2481-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212147" }, { "name": "20210201 APPLE-SA-2021-02-01-1 macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/Feb/14" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899675" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210716-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OpenLDAP", "vendor": "n/a", "versions": [ { "status": "affected", "version": "openldap 2.4.56" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP\u2019s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Reachable Assertion", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-16T10:06:15", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "DSA-4792", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4792" }, { "name": "[debian-lts-announce] 20201204 [SECURITY] [DLA 2481-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212147" }, { "name": "20210201 APPLE-SA-2021-02-01-1 macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/Feb/14" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899675" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210716-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-25709", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OpenLDAP", "version": { "version_data": [ { "version_value": "openldap 2.4.56" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP\u2019s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Reachable Assertion" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-4792", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4792" }, { "name": "[debian-lts-announce] 20201204 [SECURITY] [DLA 2481-1] openldap security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html" }, { "name": "https://support.apple.com/kb/HT212147", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212147" }, { "name": "20210201 APPLE-SA-2021-02-01-1 macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/Feb/14" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1899675", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899675" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "https://security.netapp.com/advisory/ntap-20210716-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210716-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-25709", "datePublished": "2021-05-18T11:51:42", "dateReserved": "2020-09-16T00:00:00", "dateUpdated": "2024-08-04T15:40:36.594Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2002-1379 (GCVE-0-2002-1379)
Vulnerability from cvelistv5
Published
2002-12-17 05:00
Modified
2024-08-08 03:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allows remote or local attackers to execute arbitrary code when libldap reads the .ldaprc file within applications that are running with extra privileges.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:19:28.906Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SuSE-SA:2002:047", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2002_047_openldap2.html" }, { "name": "MDKSA-2003:006", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:006" }, { "name": "DSA-227", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2003/dsa-227" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-12-06T00:00:00", "descriptions": [ { "lang": "en", "value": "OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allows remote or local attackers to execute arbitrary code when libldap reads the .ldaprc file within applications that are running with extra privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2003-01-15T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "SuSE-SA:2002:047", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2002_047_openldap2.html" }, { "name": "MDKSA-2003:006", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:006" }, { "name": "DSA-227", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2003/dsa-227" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1379", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allows remote or local attackers to execute arbitrary code when libldap reads the .ldaprc file within applications that are running with extra privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SuSE-SA:2002:047", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2002_047_openldap2.html" }, { "name": "MDKSA-2003:006", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:006" }, { "name": "DSA-227", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-227" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1379", "datePublished": "2002-12-17T05:00:00", "dateReserved": "2002-12-16T00:00:00", "dateUpdated": "2024-08-08T03:19:28.906Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-1880 (GCVE-0-2004-1880)
Vulnerability from cvelistv5
Published
2005-05-10 04:00
Modified
2024-08-08 01:07
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Memory leak in the back-bdb backend for OpenLDAP 2.1.12 and earlier allows remote attackers to cause a denial of service (memory consumption).
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:07:48.961Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "CLSA-2003:685", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000685" }, { "name": "17000", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/17000" }, { "name": "9203", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/9203" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-03-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Memory leak in the back-bdb backend for OpenLDAP 2.1.12 and earlier allows remote attackers to cause a denial of service (memory consumption)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-12-01T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "CLSA-2003:685", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000685" }, { "name": "17000", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/17000" }, { "name": "9203", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/9203" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1880", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Memory leak in the back-bdb backend for OpenLDAP 2.1.12 and earlier allows remote attackers to cause a denial of service (memory consumption)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "CLSA-2003:685", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000685" }, { "name": "17000", "refsource": "OSVDB", "url": "http://www.osvdb.org/17000" }, { "name": "9203", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/9203" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1880", "datePublished": "2005-05-10T04:00:00", "dateReserved": "2005-05-04T00:00:00", "dateUpdated": "2024-08-08T01:07:48.961Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-1546 (GCVE-0-2015-1546)
Vulnerability from cvelistv5
Published
2015-02-12 16:00
Modified
2024-08-06 04:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Double free vulnerability in the get_vrFilter function in servers/slapd/filter.c in OpenLDAP 2.4.40 allows remote attackers to cause a denial of service (crash) via a crafted search query with a matched values control.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:47:16.836Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776991" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT204659" }, { "name": "openldap-cve20151546-dos(100938)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100938" }, { "name": "APPLE-SA-2015-04-08-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html" }, { "name": "openSUSE-SU-2015:1325", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html" }, { "name": "MDVSA-2015:073", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:073" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/its/?findid=8046" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commit%3Bh=2f1a2dd329b91afe561cd06b872d09630d4edb6a" }, { "name": "62787", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62787" }, { "name": "[oss-security] 20150207 Re: CVE request: two OpenLDAP DoS issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/02/07/3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-02-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Double free vulnerability in the get_vrFilter function in servers/slapd/filter.c in OpenLDAP 2.4.40 allows remote attackers to cause a denial of service (crash) via a crafted search query with a matched values control." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776991" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT204659" }, { "name": "openldap-cve20151546-dos(100938)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100938" }, { "name": "APPLE-SA-2015-04-08-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html" }, { "name": "openSUSE-SU-2015:1325", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html" }, { "name": "MDVSA-2015:073", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:073" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/its/?findid=8046" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commit%3Bh=2f1a2dd329b91afe561cd06b872d09630d4edb6a" }, { "name": "62787", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62787" }, { "name": "[oss-security] 20150207 Re: CVE request: two OpenLDAP DoS issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/02/07/3" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-1546", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Double free vulnerability in the get_vrFilter function in servers/slapd/filter.c in OpenLDAP 2.4.40 allows remote attackers to cause a denial of service (crash) via a crafted search query with a matched values control." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776991", "refsource": "CONFIRM", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776991" }, { "name": "https://support.apple.com/HT204659", "refsource": "CONFIRM", "url": "https://support.apple.com/HT204659" }, { "name": "openldap-cve20151546-dos(100938)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100938" }, { "name": "APPLE-SA-2015-04-08-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html" }, { "name": "openSUSE-SU-2015:1325", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html" }, { "name": "MDVSA-2015:073", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:073" }, { "name": "http://www.openldap.org/its/?findid=8046", "refsource": "CONFIRM", "url": "http://www.openldap.org/its/?findid=8046" }, { "name": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=2f1a2dd329b91afe561cd06b872d09630d4edb6a", "refsource": "CONFIRM", "url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=2f1a2dd329b91afe561cd06b872d09630d4edb6a" }, { "name": "62787", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62787" }, { "name": "[oss-security] 20150207 Re: CVE request: two OpenLDAP DoS issues", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/02/07/3" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-1546", "datePublished": "2015-02-12T16:00:00", "dateReserved": "2015-02-07T00:00:00", "dateUpdated": "2024-08-06T04:47:16.836Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-3767 (GCVE-0-2009-3767)
Vulnerability from cvelistv5
Published
2009-10-23 19:00
Modified
2024-08-07 06:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:38:30.220Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2010-0752", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036138.html" }, { "name": "[oss-security] 20090923 Re: More CVE-2009-2408 like issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=oss-security\u0026m=125369675820512\u0026w=2" }, { "name": "GLSA-201406-36", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "name": "oval:org.mitre.oval:def:11178", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11178" }, { "name": "ADV-2010-1858", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1858" }, { "name": "40677", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40677" }, { "name": "oval:org.mitre.oval:def:7274", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7274" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/devel/cvsweb.cgi/libraries/libldap/tls_o.c.diff?r1=1.8\u0026r2=1.11\u0026f=h" }, { "name": "ADV-2009-3056", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3056" }, { "name": "RHSA-2010:0543", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0543.html" }, { "name": "RHSA-2011:0896", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0896.html" }, { "name": "SUSE-SR:2009:016", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "name": "38769", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38769" }, { "name": "APPLE-SA-2009-11-09-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3937" }, { "name": "[oss-security] 20090903 More CVE-2009-2408 like issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=oss-security\u0026m=125198917018936\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-09-03T00:00:00", "descriptions": [ { "lang": "en", "value": "libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "FEDORA-2010-0752", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036138.html" }, { "name": "[oss-security] 20090923 Re: More CVE-2009-2408 like issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=oss-security\u0026m=125369675820512\u0026w=2" }, { "name": "GLSA-201406-36", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "name": "oval:org.mitre.oval:def:11178", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11178" }, { "name": "ADV-2010-1858", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1858" }, { "name": "40677", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40677" }, { "name": "oval:org.mitre.oval:def:7274", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7274" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/devel/cvsweb.cgi/libraries/libldap/tls_o.c.diff?r1=1.8\u0026r2=1.11\u0026f=h" }, { "name": "ADV-2009-3056", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3056" }, { "name": "RHSA-2010:0543", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0543.html" }, { "name": "RHSA-2011:0896", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0896.html" }, { "name": "SUSE-SR:2009:016", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "name": "38769", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38769" }, { "name": "APPLE-SA-2009-11-09-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3937" }, { "name": "[oss-security] 20090903 More CVE-2009-2408 like issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=oss-security\u0026m=125198917018936\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3767", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2010-0752", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036138.html" }, { "name": "[oss-security] 20090923 Re: More CVE-2009-2408 like issues", "refsource": "MLIST", "url": "http://marc.info/?l=oss-security\u0026m=125369675820512\u0026w=2" }, { "name": "GLSA-201406-36", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "name": "oval:org.mitre.oval:def:11178", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11178" }, { "name": "ADV-2010-1858", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1858" }, { "name": "40677", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40677" }, { "name": "oval:org.mitre.oval:def:7274", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7274" }, { "name": "http://www.openldap.org/devel/cvsweb.cgi/libraries/libldap/tls_o.c.diff?r1=1.8\u0026r2=1.11\u0026f=h", "refsource": "CONFIRM", "url": "http://www.openldap.org/devel/cvsweb.cgi/libraries/libldap/tls_o.c.diff?r1=1.8\u0026r2=1.11\u0026f=h" }, { "name": "ADV-2009-3056", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3056" }, { "name": "RHSA-2010:0543", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0543.html" }, { "name": "RHSA-2011:0896", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0896.html" }, { "name": "SUSE-SR:2009:016", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "name": "38769", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38769" }, { "name": "APPLE-SA-2009-11-09-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "name": "http://support.apple.com/kb/HT3937", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3937" }, { "name": "[oss-security] 20090903 More CVE-2009-2408 like issues", "refsource": "MLIST", "url": "http://marc.info/?l=oss-security\u0026m=125198917018936\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3767", "datePublished": "2009-10-23T19:00:00", "dateReserved": "2009-10-23T00:00:00", "dateUpdated": "2024-08-07T06:38:30.220Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-36226 (GCVE-0-2020-36226)
Vulnerability from cvelistv5
Published
2021-01-25 09:44
Modified
2024-08-04 17:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
A flaw was discovered in OpenLDAP before 2.4.57 leading to a memch->bv_len miscalculation and slapd crash in the saslAuthzTo processing, resulting in denial of service.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:23:09.640Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9413" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212529" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212531" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[guacamole-issues] 20210618 [jira] [Created] (GUACAMOLE-1368) Latest docker image fails security scans.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was discovered in OpenLDAP before 2.4.57 leading to a memch-\u003ebv_len miscalculation and slapd crash in the saslAuthzTo processing, resulting in denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-29T14:07:22", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9413" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212529" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212531" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[guacamole-issues] 20210618 [jira] [Created] (GUACAMOLE-1368) Latest docker image fails security scans.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-36226", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was discovered in OpenLDAP before 2.4.57 leading to a memch-\u003ebv_len miscalculation and slapd crash in the saslAuthzTo processing, resulting in denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "name": "https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65" }, { "name": "https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439" }, { "name": "https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26" }, { "name": "https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8" }, { "name": "https://bugs.openldap.org/show_bug.cgi?id=9413", "refsource": "MISC", "url": "https://bugs.openldap.org/show_bug.cgi?id=9413" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4845" }, { "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "name": "https://support.apple.com/kb/HT212529", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "name": "https://support.apple.com/kb/HT212531", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212531" }, { "name": "https://support.apple.com/kb/HT212530", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[guacamole-issues] 20210618 [jira] [Created] (GUACAMOLE-1368) Latest docker image fails security scans.", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-36226", "datePublished": "2021-01-25T09:44:13", "dateReserved": "2021-01-25T00:00:00", "dateUpdated": "2024-08-04T17:23:09.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-1545 (GCVE-0-2015-1545)
Vulnerability from cvelistv5
Published
2015-02-12 16:00
Modified
2024-08-06 04:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The deref_parseCtrl function in servers/slapd/overlays/deref.c in OpenLDAP 2.4.13 through 2.4.40 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an empty attribute list in a deref control in a search request.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:47:16.804Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "72519", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/72519" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commit%3Bh=c32e74763f77675b9e144126e375977ed6dc562c" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT204659" }, { "name": "openldap-cve20151545-dos(100937)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100937" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776988" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html" }, { "name": "DSA-3209", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3209" }, { "name": "APPLE-SA-2015-04-08-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html" }, { "name": "openSUSE-SU-2015:1325", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html" }, { "name": "1032399", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032399" }, { "name": "MDVSA-2015:073", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:073" }, { "name": "MDVSA-2015:074", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:074" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/its/?findid=8027" }, { "name": "62787", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62787" }, { "name": "[oss-security] 20150207 Re: CVE request: two OpenLDAP DoS issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/02/07/3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT210788" }, { "name": "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "name": "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Dec/26" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-19T00:00:00", "descriptions": [ { "lang": "en", "value": "The deref_parseCtrl function in servers/slapd/overlays/deref.c in OpenLDAP 2.4.13 through 2.4.40 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an empty attribute list in a deref control in a search request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-13T20:06:07", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "72519", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/72519" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commit%3Bh=c32e74763f77675b9e144126e375977ed6dc562c" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT204659" }, { "name": "openldap-cve20151545-dos(100937)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100937" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776988" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html" }, { "name": "DSA-3209", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3209" }, { "name": "APPLE-SA-2015-04-08-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html" }, { "name": "openSUSE-SU-2015:1325", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html" }, { "name": "1032399", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032399" }, { "name": "MDVSA-2015:073", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:073" }, { "name": "MDVSA-2015:074", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:074" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/its/?findid=8027" }, { "name": "62787", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62787" }, { "name": "[oss-security] 20150207 Re: CVE request: two OpenLDAP DoS issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/02/07/3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT210788" }, { "name": "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "name": "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Dec/26" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-1545", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The deref_parseCtrl function in servers/slapd/overlays/deref.c in OpenLDAP 2.4.13 through 2.4.40 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an empty attribute list in a deref control in a search request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "72519", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72519" }, { "name": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=c32e74763f77675b9e144126e375977ed6dc562c", "refsource": "CONFIRM", "url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=c32e74763f77675b9e144126e375977ed6dc562c" }, { "name": "https://support.apple.com/HT204659", "refsource": "CONFIRM", "url": "https://support.apple.com/HT204659" }, { "name": "openldap-cve20151545-dos(100937)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100937" }, { "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776988", "refsource": "CONFIRM", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776988" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html" }, { "name": "DSA-3209", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3209" }, { "name": "APPLE-SA-2015-04-08-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html" }, { "name": "openSUSE-SU-2015:1325", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html" }, { "name": "1032399", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032399" }, { "name": "MDVSA-2015:073", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:073" }, { "name": "MDVSA-2015:074", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:074" }, { "name": "http://www.openldap.org/its/?findid=8027", "refsource": "CONFIRM", "url": "http://www.openldap.org/its/?findid=8027" }, { "name": "62787", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62787" }, { "name": "[oss-security] 20150207 Re: CVE request: two OpenLDAP DoS issues", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/02/07/3" }, { "name": "https://support.apple.com/kb/HT210788", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT210788" }, { "name": "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "name": "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Dec/26" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-1545", "datePublished": "2015-02-12T16:00:00", "dateReserved": "2015-02-07T00:00:00", "dateUpdated": "2024-08-06T04:47:16.804Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-36222 (GCVE-0-2020-36222)
Vulnerability from cvelistv5
Published
2021-01-25 09:44
Modified
2024-08-04 17:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
A flaw was discovered in OpenLDAP before 2.4.57 leading to an assertion failure in slapd in the saslAuthzTo validation, resulting in denial of service.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:23:09.733Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9406" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/02dfc32d658fadc25e4040f78e36592f6e1e1ca0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9407" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed.aa" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212529" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212531" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was discovered in OpenLDAP before 2.4.57 leading to an assertion failure in slapd in the saslAuthzTo validation, resulting in denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-29T14:06:39", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9406" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/02dfc32d658fadc25e4040f78e36592f6e1e1ca0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9407" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed.aa" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212529" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212531" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-36222", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was discovered in OpenLDAP before 2.4.57 leading to an assertion failure in slapd in the saslAuthzTo validation, resulting in denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "name": "https://bugs.openldap.org/show_bug.cgi?id=9406", "refsource": "MISC", "url": "https://bugs.openldap.org/show_bug.cgi?id=9406" }, { "name": "https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed" }, { "name": "https://git.openldap.org/openldap/openldap/-/commit/02dfc32d658fadc25e4040f78e36592f6e1e1ca0", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/commit/02dfc32d658fadc25e4040f78e36592f6e1e1ca0" }, { "name": "https://bugs.openldap.org/show_bug.cgi?id=9407", "refsource": "MISC", "url": "https://bugs.openldap.org/show_bug.cgi?id=9407" }, { "name": "https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed.aa", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed.aa" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4845" }, { "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "name": "https://support.apple.com/kb/HT212529", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "name": "https://support.apple.com/kb/HT212531", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212531" }, { "name": "https://support.apple.com/kb/HT212530", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-36222", "datePublished": "2021-01-25T09:44:38", "dateReserved": "2021-01-25T00:00:00", "dateUpdated": "2024-08-04T17:23:09.733Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-25710 (GCVE-0-2020-25710)
Vulnerability from cvelistv5
Published
2021-05-28 10:20
Modified
2024-08-04 15:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23(). The highest threat from this vulnerability is to system availability.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:40:36.750Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-4792", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4792" }, { "name": "[debian-lts-announce] 20201204 [SECURITY] [DLA 2481-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899678" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/ab3915154e69920d480205b4bf5ccb2b391a0a1f#a2feb6ed0257c21c6672793ee2f94eaadc10c72c" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210716-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "openldap", "vendor": "n/a", "versions": [ { "status": "affected", "version": "openldap 2.4.56" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23(). The highest threat from this vulnerability is to system availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-617", "description": "CWE-617", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-16T10:06:12", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "DSA-4792", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4792" }, { "name": "[debian-lts-announce] 20201204 [SECURITY] [DLA 2481-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899678" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/ab3915154e69920d480205b4bf5ccb2b391a0a1f#a2feb6ed0257c21c6672793ee2f94eaadc10c72c" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210716-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-25710", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "openldap", "version": { "version_data": [ { "version_value": "openldap 2.4.56" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23(). The highest threat from this vulnerability is to system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-617" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-4792", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4792" }, { "name": "[debian-lts-announce] 20201204 [SECURITY] [DLA 2481-1] openldap security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1899678", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899678" }, { "name": "https://git.openldap.org/openldap/openldap/-/commit/ab3915154e69920d480205b4bf5ccb2b391a0a1f#a2feb6ed0257c21c6672793ee2f94eaadc10c72c", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/commit/ab3915154e69920d480205b4bf5ccb2b391a0a1f#a2feb6ed0257c21c6672793ee2f94eaadc10c72c" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "https://security.netapp.com/advisory/ntap-20210716-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210716-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-25710", "datePublished": "2021-05-28T10:20:20", "dateReserved": "2020-09-16T00:00:00", "dateUpdated": "2024-08-04T15:40:36.750Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-5707 (GCVE-0-2007-5707)
Vulnerability from cvelistv5
Published
2007-10-30 19:00
Modified
2024-08-07 15:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
OpenLDAP before 2.3.39 allows remote attackers to cause a denial of service (slapd crash) via an LDAP request with a malformed objectClasses attribute. NOTE: this has been reported as a double free, but the reports are inconsistent.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:39:13.978Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "27683", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27683" }, { "name": "1018924", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018924" }, { "name": "29461", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29461" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5119" }, { "name": "MDKSA-2007:215", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:215" }, { "name": "oval:org.mitre.oval:def:10183", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10183" }, { "name": "29682", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29682" }, { "name": "27756", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27756" }, { "name": "GLSA-200803-28", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200803-28.xml" }, { "name": "DSA-1541", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1541" }, { "name": "SUSE-SR:2007:024", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_24_sr.html" }, { "name": "27596", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27596" }, { "name": "ADV-2009-3184", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3184" }, { "name": "[openldap-announce] 20071026 OpenLDAP 2.3.39 available", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openldap.org/lists/openldap-announce/200710/msg00001.html" }, { "name": "27424", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27424" }, { "name": "RHSA-2007:1038", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1038.html" }, { "name": "APPLE-SA-2009-11-09-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "name": "USN-551-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-551-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=440632" }, { "name": "ADV-2007-3645", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3645" }, { "name": "RHSA-2007:1037", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1037.html" }, { "name": "26245", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26245" }, { "name": "FEDORA-2007-741", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.redhat.com/archives/fedora-package-announce/2007-November/msg00460.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3937" }, { "name": "27587", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27587" }, { "name": "27868", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27868" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-10-07T00:00:00", "descriptions": [ { "lang": "en", "value": "OpenLDAP before 2.3.39 allows remote attackers to cause a denial of service (slapd crash) via an LDAP request with a malformed objectClasses attribute. NOTE: this has been reported as a double free, but the reports are inconsistent." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "27683", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27683" }, { "name": "1018924", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018924" }, { "name": "29461", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29461" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5119" }, { "name": "MDKSA-2007:215", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:215" }, { "name": "oval:org.mitre.oval:def:10183", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10183" }, { "name": "29682", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29682" }, { "name": "27756", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27756" }, { "name": "GLSA-200803-28", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200803-28.xml" }, { "name": "DSA-1541", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1541" }, { "name": "SUSE-SR:2007:024", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_24_sr.html" }, { "name": "27596", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27596" }, { "name": "ADV-2009-3184", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3184" }, { "name": "[openldap-announce] 20071026 OpenLDAP 2.3.39 available", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openldap.org/lists/openldap-announce/200710/msg00001.html" }, { "name": "27424", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27424" }, { "name": "RHSA-2007:1038", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1038.html" }, { "name": "APPLE-SA-2009-11-09-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "name": "USN-551-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-551-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=440632" }, { "name": "ADV-2007-3645", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3645" }, { "name": "RHSA-2007:1037", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1037.html" }, { "name": "26245", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26245" }, { "name": "FEDORA-2007-741", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.redhat.com/archives/fedora-package-announce/2007-November/msg00460.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3937" }, { "name": "27587", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27587" }, { "name": "27868", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27868" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2007-5707", "datePublished": "2007-10-30T19:00:00", "dateReserved": "2007-10-30T00:00:00", "dateUpdated": "2024-08-07T15:39:13.978Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-5708 (GCVE-0-2007-5708)
Vulnerability from cvelistv5
Published
2007-10-30 19:00
Modified
2024-08-07 15:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
slapo-pcache (overlays/pcache.c) in slapd in OpenLDAP before 2.3.39, when running as a proxy-caching server, allocates memory using a malloc variant instead of calloc, which prevents an array from being initialized properly and might allow attackers to cause a denial of service (segmentation fault) via unknown vectors that prevent the array from being null terminated.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:39:13.616Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "27683", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27683" }, { "name": "MDVSA-2008:058", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:058" }, { "name": "29461", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29461" }, { "name": "29225", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29225" }, { "name": "29682", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29682" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5163" }, { "name": "27756", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27756" }, { "name": "GLSA-200803-28", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200803-28.xml" }, { "name": "DSA-1541", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1541" }, { "name": "SUSE-SR:2007:024", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_24_sr.html" }, { "name": "[openldap-announce] 20071026 OpenLDAP 2.3.39 available", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openldap.org/lists/openldap-announce/200710/msg00001.html" }, { "name": "27424", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27424" }, { "name": "USN-551-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-551-1" }, { "name": "ADV-2007-3645", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3645" }, { "name": "26245", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26245" }, { "name": "FEDORA-2007-741", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.redhat.com/archives/fedora-package-announce/2007-November/msg00460.html" }, { "name": "27868", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27868" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-10-07T00:00:00", "descriptions": [ { "lang": "en", "value": "slapo-pcache (overlays/pcache.c) in slapd in OpenLDAP before 2.3.39, when running as a proxy-caching server, allocates memory using a malloc variant instead of calloc, which prevents an array from being initialized properly and might allow attackers to cause a denial of service (segmentation fault) via unknown vectors that prevent the array from being null terminated." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-11-22T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "27683", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27683" }, { "name": "MDVSA-2008:058", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:058" }, { "name": "29461", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29461" }, { "name": "29225", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29225" }, { "name": "29682", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29682" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5163" }, { "name": "27756", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27756" }, { "name": "GLSA-200803-28", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200803-28.xml" }, { "name": "DSA-1541", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1541" }, { "name": "SUSE-SR:2007:024", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_24_sr.html" }, { "name": "[openldap-announce] 20071026 OpenLDAP 2.3.39 available", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openldap.org/lists/openldap-announce/200710/msg00001.html" }, { "name": "27424", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27424" }, { "name": "USN-551-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-551-1" }, { "name": "ADV-2007-3645", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3645" }, { "name": "26245", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26245" }, { "name": "FEDORA-2007-741", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.redhat.com/archives/fedora-package-announce/2007-November/msg00460.html" }, { "name": "27868", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27868" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2007-5708", "datePublished": "2007-10-30T19:00:00", "dateReserved": "2007-10-30T00:00:00", "dateUpdated": "2024-08-07T15:39:13.616Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2000-0336 (GCVE-0-2000-0336)
Vulnerability from cvelistv5
Published
2000-07-12 04:00
Modified
2024-08-08 05:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Linux OpenLDAP server allows local users to modify arbitrary files via a symlink attack.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:14:21.407Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2000:012", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2000-012.html" }, { "name": "TLSA2000010-1", "tags": [ "vendor-advisory", "x_refsource_TURBO", "x_transferred" ], "url": "http://www.turbolinux.com/pipermail/tl-security-announce/2000-May/000009.html" }, { "name": "1232", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/1232" }, { "name": "CSSA-2000-009.0", "tags": [ "vendor-advisory", "x_refsource_CALDERA", "x_transferred" ], "url": "ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-2000-009.0.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-04-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Linux OpenLDAP server allows local users to modify arbitrary files via a symlink attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2004-09-02T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2000:012", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2000-012.html" }, { "name": "TLSA2000010-1", "tags": [ "vendor-advisory", "x_refsource_TURBO" ], "url": "http://www.turbolinux.com/pipermail/tl-security-announce/2000-May/000009.html" }, { "name": "1232", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/1232" }, { "name": "CSSA-2000-009.0", "tags": [ "vendor-advisory", "x_refsource_CALDERA" ], "url": "ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-2000-009.0.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0336", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Linux OpenLDAP server allows local users to modify arbitrary files via a symlink attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2000:012", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2000-012.html" }, { "name": "TLSA2000010-1", "refsource": "TURBO", "url": "http://www.turbolinux.com/pipermail/tl-security-announce/2000-May/000009.html" }, { "name": "1232", "refsource": "BID", "url": "http://www.securityfocus.com/bid/1232" }, { "name": "CSSA-2000-009.0", "refsource": "CALDERA", "url": "ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-2000-009.0.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0336", "datePublished": "2000-07-12T04:00:00", "dateReserved": "2000-05-11T00:00:00", "dateUpdated": "2024-08-08T05:14:21.407Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-2953 (GCVE-0-2023-2953)
Vulnerability from cvelistv5
Published
2023-05-30 00:00
Modified
2025-01-10 21:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:41:04.071Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9904" }, { "tags": [ "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2023-2953" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230703-0005/" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/kb/HT213843" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/kb/HT213844" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/kb/HT213845" }, { "name": "20230725 APPLE-SA-2023-07-24-6 macOS Big Sur 11.7.9", "tags": [ "mailing-list", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2023/Jul/52" }, { "name": "20230725 APPLE-SA-2023-07-24-5 macOS Monterey 12.6.8", "tags": [ "mailing-list", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2023/Jul/48" }, { "name": "20230725 APPLE-SA-2023-07-24-4 macOS Ventura 13.5", "tags": [ "mailing-list", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2023/Jul/47" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-2953", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-10T21:27:47.208145Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-10T21:28:27.261Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "openldap", "vendor": "n/a", "versions": [ { "status": "affected", "version": "openldap-2.4" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-25T00:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://bugs.openldap.org/show_bug.cgi?id=9904" }, { "url": "https://access.redhat.com/security/cve/CVE-2023-2953" }, { "url": "https://security.netapp.com/advisory/ntap-20230703-0005/" }, { "url": "https://support.apple.com/kb/HT213843" }, { "url": "https://support.apple.com/kb/HT213844" }, { "url": "https://support.apple.com/kb/HT213845" }, { "name": "20230725 APPLE-SA-2023-07-24-6 macOS Big Sur 11.7.9", "tags": [ "mailing-list" ], "url": "http://seclists.org/fulldisclosure/2023/Jul/52" }, { "name": "20230725 APPLE-SA-2023-07-24-5 macOS Monterey 12.6.8", "tags": [ "mailing-list" ], "url": "http://seclists.org/fulldisclosure/2023/Jul/48" }, { "name": "20230725 APPLE-SA-2023-07-24-4 macOS Ventura 13.5", "tags": [ "mailing-list" ], "url": "http://seclists.org/fulldisclosure/2023/Jul/47" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2023-2953", "datePublished": "2023-05-30T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2025-01-10T21:28:27.261Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-4079 (GCVE-0-2011-4079)
Vulnerability from cvelistv5
Published
2011-10-27 20:00
Modified
2024-08-06 23:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Off-by-one error in the UTF8StringNormalize function in OpenLDAP 2.4.26 and earlier allows remote attackers to cause a denial of service (slapd crash) via a zero-length string that triggers a heap-based buffer overflow, as demonstrated using an empty postalAddressAttribute value in an LDIF entry.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:53:32.849Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201406-36", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "name": "[oss-security] 20111026 CVE Request: openldap2 UTF8StringNormalize() can cause a (one-byte) buffer overflow", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/10/26/5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7059%3Bselectid=7059" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=749324" }, { "name": "USN-1266-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1266-1" }, { "name": "46599", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/46599" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commitdiff%3Bh=507238713b71208ec4f262f312cb495a302df9e9" }, { "name": "50384", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/50384" }, { "name": "openldap-utf8stringnormalize-dos(70991)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70991" }, { "name": "[oss-security] 20111026 Re: CVE Request: openldap2 UTF8StringNormalize() can cause a (one-byte) buffer overflow", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/10/26/9" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-10-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Off-by-one error in the UTF8StringNormalize function in OpenLDAP 2.4.26 and earlier allows remote attackers to cause a denial of service (slapd crash) via a zero-length string that triggers a heap-based buffer overflow, as demonstrated using an empty postalAddressAttribute value in an LDIF entry." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "GLSA-201406-36", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "name": "[oss-security] 20111026 CVE Request: openldap2 UTF8StringNormalize() can cause a (one-byte) buffer overflow", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/10/26/5" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7059%3Bselectid=7059" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=749324" }, { "name": "USN-1266-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1266-1" }, { "name": "46599", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/46599" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commitdiff%3Bh=507238713b71208ec4f262f312cb495a302df9e9" }, { "name": "50384", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/50384" }, { "name": "openldap-utf8stringnormalize-dos(70991)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70991" }, { "name": "[oss-security] 20111026 Re: CVE Request: openldap2 UTF8StringNormalize() can cause a (one-byte) buffer overflow", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/10/26/9" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-4079", "datePublished": "2011-10-27T20:00:00", "dateReserved": "2011-10-18T00:00:00", "dateUpdated": "2024-08-06T23:53:32.849Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-2668 (GCVE-0-2012-2668)
Vulnerability from cvelistv5
Published
2012-06-17 01:00
Modified
2024-08-06 19:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
libraries/libldap/tls_m.c in OpenLDAP, possibly 2.4.31 and earlier, when using the Mozilla NSS backend, always uses the default cipher suite even when TLSCipherSuite is set, which might cause OpenLDAP to use weaker ciphers than intended and make it easier for remote attackers to obtain sensitive information.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:42:31.816Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20120606 Re: CVE request: openldap does not honor TLSCipherSuite configuration option", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/06/06/2" }, { "name": "GLSA-201406-36", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=676309" }, { "name": "RHSA-2012:1151", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1151.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/its/index.cgi?findid=7285" }, { "name": "[oss-security] 20120605 CVE request: openldap does not honor TLSCipherSuite configuration option", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/06/05/4" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=825875" }, { "name": "[oss-security] 20120605 Re: CVE request: openldap does not honor TLSCipherSuite configuration option", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/06/06/1" }, { "name": "openldap-nss-weak-security(76099)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76099" }, { "name": "1027127", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1027127" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commitdiff%3Bh=2c2bb2e" }, { "name": "53823", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53823" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT210788" }, { "name": "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "name": "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Dec/26" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-06-04T00:00:00", "descriptions": [ { "lang": "en", "value": "libraries/libldap/tls_m.c in OpenLDAP, possibly 2.4.31 and earlier, when using the Mozilla NSS backend, always uses the default cipher suite even when TLSCipherSuite is set, which might cause OpenLDAP to use weaker ciphers than intended and make it easier for remote attackers to obtain sensitive information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-13T20:06:25", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20120606 Re: CVE request: openldap does not honor TLSCipherSuite configuration option", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/06/06/2" }, { "name": "GLSA-201406-36", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=676309" }, { "name": "RHSA-2012:1151", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1151.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/its/index.cgi?findid=7285" }, { "name": "[oss-security] 20120605 CVE request: openldap does not honor TLSCipherSuite configuration option", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/06/05/4" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=825875" }, { "name": "[oss-security] 20120605 Re: CVE request: openldap does not honor TLSCipherSuite configuration option", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/06/06/1" }, { "name": "openldap-nss-weak-security(76099)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76099" }, { "name": "1027127", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1027127" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commitdiff%3Bh=2c2bb2e" }, { "name": "53823", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53823" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT210788" }, { "name": "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "name": "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Dec/26" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-2668", "datePublished": "2012-06-17T01:00:00", "dateReserved": "2012-05-14T00:00:00", "dateUpdated": "2024-08-06T19:42:31.816Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-4442 (GCVE-0-2005-4442)
Vulnerability from cvelistv5
Published
2005-12-21 02:00
Modified
2024-09-17 01:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Untrusted search path vulnerability in OpenLDAP before 2.2.28-r3 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:46:05.079Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "18040", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18040/" }, { "name": "GLSA-200512-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-07.xml" }, { "name": "15120", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15120" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in OpenLDAP before 2.2.28-r3 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-12-21T02:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "18040", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18040/" }, { "name": "GLSA-200512-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-07.xml" }, { "name": "15120", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15120" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-4442", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Untrusted search path vulnerability in OpenLDAP before 2.2.28-r3 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "18040", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18040/" }, { "name": "GLSA-200512-07", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-07.xml" }, { "name": "15120", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15120" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-4442", "datePublished": "2005-12-21T02:00:00Z", "dateReserved": "2005-12-21T00:00:00Z", "dateUpdated": "2024-09-17T01:41:21.803Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-36224 (GCVE-0-2020-36224)
Vulnerability from cvelistv5
Published
2021-01-25 09:44
Modified
2024-08-04 17:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:23:09.688Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9409" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212529" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212531" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-29T14:08:43", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9409" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212529" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212531" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-36224", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "name": "https://bugs.openldap.org/show_bug.cgi?id=9409", "refsource": "MISC", "url": "https://bugs.openldap.org/show_bug.cgi?id=9409" }, { "name": "https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65" }, { "name": "https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439" }, { "name": "https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26" }, { "name": "https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4845" }, { "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "name": "https://support.apple.com/kb/HT212529", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "name": "https://support.apple.com/kb/HT212531", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212531" }, { "name": "https://support.apple.com/kb/HT212530", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-36224", "datePublished": "2021-01-25T09:44:29", "dateReserved": "2021-01-25T00:00:00", "dateUpdated": "2024-08-04T17:23:09.688Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-6698 (GCVE-0-2007-6698)
Vulnerability from cvelistv5
Published
2008-02-01 21:00
Modified
2024-08-07 16:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The BDB backend for slapd in OpenLDAP before 2.3.36 allows remote authenticated users to cause a denial of service (crash) via a potentially-successful modify operation with the NOOP control set to critical, possibly due to a double free vulnerability.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:18:20.627Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SR:2008:010", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html" }, { "name": "MDVSA-2008:058", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:058" }, { "name": "29225", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29225" }, { "name": "1019480", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019480" }, { "name": "[openldap-bugs] 20070411 (ITS#4925) Modify operation with NOOP control on a BDB backend causes slapd to crash", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openldap.org/lists/openldap-bugs/200704/msg00067.html" }, { "name": "28817", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28817" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0059" }, { "name": "29682", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29682" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0059" }, { "name": "29256", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29256" }, { "name": "20080212 rPSA-2008-0059-1 openldap openldap-clients openldap-servers", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/488242/100/200/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431203" }, { "name": "29068", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29068" }, { "name": "USN-584-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-584-1" }, { "name": "RHSA-2008:0110", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0110.html" }, { "name": "28953", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28953" }, { "name": "DSA-1541", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1541" }, { "name": "oval:org.mitre.oval:def:10748", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10748" }, { "name": "FEDORA-2008-1307", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00105.html" }, { "name": "[openldap-bugs] 20070411 Re: (ITS#4925) Modify operation with NOOP control on a BDB backend causes slapd to crash", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openldap.org/lists/openldap-bugs/200704/msg00068.html" }, { "name": "ADV-2009-3184", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3184" }, { "name": "APPLE-SA-2009-11-09-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "name": "29957", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29957" }, { "name": "26245", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26245" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3937" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-04-11T00:00:00", "descriptions": [ { "lang": "en", "value": "The BDB backend for slapd in OpenLDAP before 2.3.36 allows remote authenticated users to cause a denial of service (crash) via a potentially-successful modify operation with the NOOP control set to critical, possibly due to a double free vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "SUSE-SR:2008:010", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html" }, { "name": "MDVSA-2008:058", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:058" }, { "name": "29225", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29225" }, { "name": "1019480", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019480" }, { "name": "[openldap-bugs] 20070411 (ITS#4925) Modify operation with NOOP control on a BDB backend causes slapd to crash", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openldap.org/lists/openldap-bugs/200704/msg00067.html" }, { "name": "28817", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28817" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0059" }, { "name": "29682", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29682" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0059" }, { "name": "29256", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29256" }, { "name": "20080212 rPSA-2008-0059-1 openldap openldap-clients openldap-servers", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/488242/100/200/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431203" }, { "name": "29068", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29068" }, { "name": "USN-584-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-584-1" }, { "name": "RHSA-2008:0110", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0110.html" }, { "name": "28953", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28953" }, { "name": "DSA-1541", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1541" }, { "name": "oval:org.mitre.oval:def:10748", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10748" }, { "name": "FEDORA-2008-1307", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00105.html" }, { "name": "[openldap-bugs] 20070411 Re: (ITS#4925) Modify operation with NOOP control on a BDB backend causes slapd to crash", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openldap.org/lists/openldap-bugs/200704/msg00068.html" }, { "name": "ADV-2009-3184", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3184" }, { "name": "APPLE-SA-2009-11-09-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "name": "29957", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29957" }, { "name": "26245", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26245" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3937" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6698", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The BDB backend for slapd in OpenLDAP before 2.3.36 allows remote authenticated users to cause a denial of service (crash) via a potentially-successful modify operation with the NOOP control set to critical, possibly due to a double free vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SR:2008:010", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html" }, { "name": "MDVSA-2008:058", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:058" }, { "name": "29225", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29225" }, { "name": "1019480", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019480" }, { "name": "[openldap-bugs] 20070411 (ITS#4925) Modify operation with NOOP control on a BDB backend causes slapd to crash", "refsource": "MLIST", "url": "http://www.openldap.org/lists/openldap-bugs/200704/msg00067.html" }, { "name": "28817", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28817" }, { "name": "http://wiki.rpath.com/Advisories:rPSA-2008-0059", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0059" }, { "name": "29682", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29682" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0059", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0059" }, { "name": "29256", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29256" }, { "name": "20080212 rPSA-2008-0059-1 openldap openldap-clients openldap-servers", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/488242/100/200/threaded" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=431203", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431203" }, { "name": "29068", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29068" }, { "name": "USN-584-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-584-1" }, { "name": "RHSA-2008:0110", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0110.html" }, { "name": "28953", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28953" }, { "name": "DSA-1541", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1541" }, { "name": "oval:org.mitre.oval:def:10748", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10748" }, { "name": "FEDORA-2008-1307", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00105.html" }, { "name": "[openldap-bugs] 20070411 Re: (ITS#4925) Modify operation with NOOP control on a BDB backend causes slapd to crash", "refsource": "MLIST", "url": "http://www.openldap.org/lists/openldap-bugs/200704/msg00068.html" }, { "name": "ADV-2009-3184", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3184" }, { "name": "APPLE-SA-2009-11-09-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "name": "29957", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29957" }, { "name": "26245", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26245" }, { "name": "http://support.apple.com/kb/HT3937", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3937" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6698", "datePublished": "2008-02-01T21:00:00", "dateReserved": "2008-02-01T00:00:00", "dateUpdated": "2024-08-07T16:18:20.627Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-9713 (GCVE-0-2014-9713)
Vulnerability from cvelistv5
Published
2015-04-01 14:00
Modified
2024-08-06 13:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The default slapd configuration in the Debian openldap package 2.4.23-3 through 2.4.39-1.1 allows remote authenticated users to modify the user's permissions and other user attributes via unspecified vectors.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:55:04.632Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761406" }, { "name": "USN-2742-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2742-1" }, { "name": "DSA-3209", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3209" }, { "name": "73217", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/73217" }, { "name": "[oss-security] 20150329 Re: CVE request (Debian specific): slapd: dangerous access rule in default config", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/03/29/2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-09-13T00:00:00", "descriptions": [ { "lang": "en", "value": "The default slapd configuration in the Debian openldap package 2.4.23-3 through 2.4.39-1.1 allows remote authenticated users to modify the user\u0027s permissions and other user attributes via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-20T16:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761406" }, { "name": "USN-2742-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2742-1" }, { "name": "DSA-3209", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3209" }, { "name": "73217", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/73217" }, { "name": "[oss-security] 20150329 Re: CVE request (Debian specific): slapd: dangerous access rule in default config", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/03/29/2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2014-9713", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The default slapd configuration in the Debian openldap package 2.4.23-3 through 2.4.39-1.1 allows remote authenticated users to modify the user\u0027s permissions and other user attributes via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761406", "refsource": "CONFIRM", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761406" }, { "name": "USN-2742-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2742-1" }, { "name": "DSA-3209", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3209" }, { "name": "73217", "refsource": "BID", "url": "http://www.securityfocus.com/bid/73217" }, { "name": "[oss-security] 20150329 Re: CVE request (Debian specific): slapd: dangerous access rule in default config", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/03/29/2" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2014-9713", "datePublished": "2015-04-01T14:00:00", "dateReserved": "2015-03-29T00:00:00", "dateUpdated": "2024-08-06T13:55:04.632Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4449 (GCVE-0-2013-4449)
Vulnerability from cvelistv5
Published
2014-02-05 18:00
Modified
2024-08-06 16:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:45:14.585Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/its/index.cgi/Incoming?id=7723" }, { "name": "MDVSA-2014:026", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:026" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019490" }, { "name": "DSA-3209", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3209" }, { "name": "RHSA-2014:0126", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0126.html" }, { "name": "[oss-security] 20131018 Re: CVE request: slapd segfaults on certain queries with rwm overlay enabled", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/10/19/3" }, { "name": "RHSA-2014:0206", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0206.html" }, { "name": "63190", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/63190" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "1029711", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029711" }, { "name": "20140401 Cisco Unified Communications Manager Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-4449" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10735" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT210788" }, { "name": "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "name": "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Dec/26" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-10-11T00:00:00", "descriptions": [ { "lang": "en", "value": "The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-13T20:06:10", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/its/index.cgi/Incoming?id=7723" }, { "name": "MDVSA-2014:026", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:026" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019490" }, { "name": "DSA-3209", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3209" }, { "name": "RHSA-2014:0126", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0126.html" }, { "name": "[oss-security] 20131018 Re: CVE request: slapd segfaults on certain queries with rwm overlay enabled", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2013/10/19/3" }, { "name": "RHSA-2014:0206", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0206.html" }, { "name": "63190", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/63190" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "1029711", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029711" }, { "name": "20140401 Cisco Unified Communications Manager Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-4449" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10735" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT210788" }, { "name": "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "name": "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Dec/26" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4449", "datePublished": "2014-02-05T18:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:45:14.585Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-2754 (GCVE-0-2006-2754)
Vulnerability from cvelistv5
Published
2006-06-01 17:00
Modified
2024-08-07 17:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in st.c in slurpd for OpenLDAP before 2.3.22 might allow attackers to execute arbitrary code via a long hostname.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T17:58:52.083Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-305-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/305-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c.diff?r1=1.21\u0026r2=1.22\u0026hideattic=1\u0026sortbydate=0\u0026f=h" }, { "name": "20126", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20126" }, { "name": "20495", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20495" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c?hideattic=1\u0026sortbydate=0#rev1.22" }, { "name": "ADV-2006-1921", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1921" }, { "name": "GLSA-200606-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-17.xml" }, { "name": "20060609 rPSA-2006-0099-1 openldap openldap-clients openldap-servers", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/436674/100/0/threaded" }, { "name": "MDKSA-2006:096", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:096" }, { "name": "20685", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20685" }, { "name": "25659", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/25659" }, { "name": "OpenPKG-SA-2006.008", "tags": [ "vendor-advisory", "x_refsource_OPENPKG", "x_transferred" ], "url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.008-openldap.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/software/release/changes.html" }, { "name": "20848", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20848" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-05-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in st.c in slurpd for OpenLDAP before 2.3.22 might allow attackers to execute arbitrary code via a long hostname." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-18T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-305-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/305-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c.diff?r1=1.21\u0026r2=1.22\u0026hideattic=1\u0026sortbydate=0\u0026f=h" }, { "name": "20126", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20126" }, { "name": "20495", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20495" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c?hideattic=1\u0026sortbydate=0#rev1.22" }, { "name": "ADV-2006-1921", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1921" }, { "name": "GLSA-200606-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-17.xml" }, { "name": "20060609 rPSA-2006-0099-1 openldap openldap-clients openldap-servers", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/436674/100/0/threaded" }, { "name": "MDKSA-2006:096", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:096" }, { "name": "20685", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20685" }, { "name": "25659", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/25659" }, { "name": "OpenPKG-SA-2006.008", "tags": [ "vendor-advisory", "x_refsource_OPENPKG" ], "url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.008-openldap.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/software/release/changes.html" }, { "name": "20848", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20848" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-2754", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in st.c in slurpd for OpenLDAP before 2.3.22 might allow attackers to execute arbitrary code via a long hostname." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-305-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/305-1/" }, { "name": "http://www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c.diff?r1=1.21\u0026r2=1.22\u0026hideattic=1\u0026sortbydate=0\u0026f=h", "refsource": "CONFIRM", "url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c.diff?r1=1.21\u0026r2=1.22\u0026hideattic=1\u0026sortbydate=0\u0026f=h" }, { "name": "20126", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20126" }, { "name": "20495", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20495" }, { "name": "http://www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c?hideattic=1\u0026sortbydate=0#rev1.22", "refsource": "CONFIRM", "url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c?hideattic=1\u0026sortbydate=0#rev1.22" }, { "name": "ADV-2006-1921", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/1921" }, { "name": "GLSA-200606-17", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-17.xml" }, { "name": "20060609 rPSA-2006-0099-1 openldap openldap-clients openldap-servers", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/436674/100/0/threaded" }, { "name": "MDKSA-2006:096", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:096" }, { "name": "20685", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20685" }, { "name": "25659", "refsource": "OSVDB", "url": "http://www.osvdb.org/25659" }, { "name": "OpenPKG-SA-2006.008", "refsource": "OPENPKG", "url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.008-openldap.html" }, { "name": "http://www.openldap.org/software/release/changes.html", "refsource": "CONFIRM", "url": "http://www.openldap.org/software/release/changes.html" }, { "name": "20848", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20848" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-2754", "datePublished": "2006-06-01T17:00:00", "dateReserved": "2006-06-01T00:00:00", "dateUpdated": "2024-08-07T17:58:52.083Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-12243 (GCVE-0-2020-12243)
Vulnerability from cvelistv5
Published
2020-04-28 18:07
Modified
2024-08-04 11:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters with nested boolean expressions can result in denial of service (daemon crash).
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:48:58.368Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-4666", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4666" }, { "name": "[debian-lts-announce] 20200502 [SECURITY] [DLA 2199-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00001.html" }, { "name": "USN-4352-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4352-2/" }, { "name": "openSUSE-SU-2020:0647", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00016.html" }, { "name": "USN-4352-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4352-1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9202" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_4/CHANGES" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/98464c11df8247d6a11b52e294ba5dd4f0380440" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200511-0003/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT211289" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters with nested boolean expressions can result in denial of service (daemon crash)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T23:21:12", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "DSA-4666", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4666" }, { "name": "[debian-lts-announce] 20200502 [SECURITY] [DLA 2199-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00001.html" }, { "name": "USN-4352-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4352-2/" }, { "name": "openSUSE-SU-2020:0647", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00016.html" }, { "name": "USN-4352-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4352-1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9202" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_4/CHANGES" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/98464c11df8247d6a11b52e294ba5dd4f0380440" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200511-0003/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT211289" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-12243", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters with nested boolean expressions can result in denial of service (daemon crash)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-4666", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4666" }, { "name": "[debian-lts-announce] 20200502 [SECURITY] [DLA 2199-1] openldap security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00001.html" }, { "name": "USN-4352-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4352-2/" }, { "name": "openSUSE-SU-2020:0647", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00016.html" }, { "name": "USN-4352-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4352-1/" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "https://bugs.openldap.org/show_bug.cgi?id=9202", "refsource": "MISC", "url": "https://bugs.openldap.org/show_bug.cgi?id=9202" }, { "name": "https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_4/CHANGES", "refsource": "CONFIRM", "url": "https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_4/CHANGES" }, { "name": "https://git.openldap.org/openldap/openldap/-/commit/98464c11df8247d6a11b52e294ba5dd4f0380440", "refsource": "CONFIRM", "url": "https://git.openldap.org/openldap/openldap/-/commit/98464c11df8247d6a11b52e294ba5dd4f0380440" }, { "name": "https://security.netapp.com/advisory/ntap-20200511-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200511-0003/" }, { "name": "https://support.apple.com/kb/HT211289", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT211289" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-12243", "datePublished": "2020-04-28T18:07:29", "dateReserved": "2020-04-24T00:00:00", "dateUpdated": "2024-08-04T11:48:58.368Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2002-1508 (GCVE-0-2002-1508)
Vulnerability from cvelistv5
Published
2003-02-11 05:00
Modified
2024-08-08 03:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
slapd in OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allows local users to overwrite arbitrary files via a race condition during the creation of a log file for rejected replication requests.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:26:28.699Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openldap-acl-slapd-bo(11288)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/11288.php" }, { "name": "RHSA-2003:040", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-040.html" }, { "name": "SuSE-SA:2002:047", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2002_047_openldap2.html" }, { "name": "MDKSA-2003:006", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:006" }, { "name": "DSA-227", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2003/dsa-227" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-12-06T00:00:00", "descriptions": [ { "lang": "en", "value": "slapd in OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allows local users to overwrite arbitrary files via a race condition during the creation of a log file for rejected replication requests." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2003-03-18T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "openldap-acl-slapd-bo(11288)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/11288.php" }, { "name": "RHSA-2003:040", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-040.html" }, { "name": "SuSE-SA:2002:047", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2002_047_openldap2.html" }, { "name": "MDKSA-2003:006", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:006" }, { "name": "DSA-227", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2003/dsa-227" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1508", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "slapd in OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allows local users to overwrite arbitrary files via a race condition during the creation of a log file for rejected replication requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openldap-acl-slapd-bo(11288)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/11288.php" }, { "name": "RHSA-2003:040", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-040.html" }, { "name": "SuSE-SA:2002:047", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2002_047_openldap2.html" }, { "name": "MDKSA-2003:006", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:006" }, { "name": "DSA-227", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-227" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1508", "datePublished": "2003-02-11T05:00:00", "dateReserved": "2003-02-06T00:00:00", "dateUpdated": "2024-08-08T03:26:28.699Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2000-0748 (GCVE-0-2000-0748)
Vulnerability from cvelistv5
Published
2000-09-21 04:00
Modified
2024-08-08 05:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
OpenLDAP 1.2.11 and earlier improperly installs the ud binary with group write permissions, which could allow any user in that group to replace the binary with a Trojan horse.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:28:41.569Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20000726 Group-writable executable in OpenLDAP", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0375.html" }, { "name": "1511", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/1511" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "OpenLDAP 1.2.11 and earlier improperly installs the ud binary with group write permissions, which could allow any user in that group to replace the binary with a Trojan horse." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2001-12-16T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20000726 Group-writable executable in OpenLDAP", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0375.html" }, { "name": "1511", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/1511" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0748", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenLDAP 1.2.11 and earlier improperly installs the ud binary with group write permissions, which could allow any user in that group to replace the binary with a Trojan horse." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20000726 Group-writable executable in OpenLDAP", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0375.html" }, { "name": "1511", "refsource": "BID", "url": "http://www.securityfocus.com/bid/1511" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0748", "datePublished": "2000-09-21T04:00:00", "dateReserved": "2000-09-19T00:00:00", "dateUpdated": "2024-08-08T05:28:41.569Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-1201 (GCVE-0-2003-1201)
Vulnerability from cvelistv5
Published
2005-05-10 04:00
Modified
2024-08-08 02:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
ldbm_back_exop_passwd in the back-ldbm backend in passwd.c for OpenLDAP 2.1.12 and earlier, when the slap_passwd_parse function does not return LDAP_SUCCESS, attempts to free an uninitialized pointer, which allows remote attackers to cause a denial of service (segmentation fault).
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:19:45.925Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "CLSA-2003:685", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000685" }, { "name": "17000", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/17000" }, { "name": "11261", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/11261" }, { "name": "GLSA-200403-12", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200403-12.xml" }, { "name": "7656", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/7656" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/its/index.cgi?findid=2390" }, { "name": "9203", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/9203" }, { "name": "openldap-back-ldbm-dos(12520)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12520" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-07-04T00:00:00", "descriptions": [ { "lang": "en", "value": "ldbm_back_exop_passwd in the back-ldbm backend in passwd.c for OpenLDAP 2.1.12 and earlier, when the slap_passwd_parse function does not return LDAP_SUCCESS, attempts to free an uninitialized pointer, which allows remote attackers to cause a denial of service (segmentation fault)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "CLSA-2003:685", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000685" }, { "name": "17000", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/17000" }, { "name": "11261", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/11261" }, { "name": "GLSA-200403-12", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200403-12.xml" }, { "name": "7656", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/7656" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/its/index.cgi?findid=2390" }, { "name": "9203", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/9203" }, { "name": "openldap-back-ldbm-dos(12520)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12520" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1201", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ldbm_back_exop_passwd in the back-ldbm backend in passwd.c for OpenLDAP 2.1.12 and earlier, when the slap_passwd_parse function does not return LDAP_SUCCESS, attempts to free an uninitialized pointer, which allows remote attackers to cause a denial of service (segmentation fault)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "CLSA-2003:685", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000685" }, { "name": "17000", "refsource": "OSVDB", "url": "http://www.osvdb.org/17000" }, { "name": "11261", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/11261" }, { "name": "GLSA-200403-12", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200403-12.xml" }, { "name": "7656", "refsource": "BID", "url": "http://www.securityfocus.com/bid/7656" }, { "name": "http://www.openldap.org/its/index.cgi?findid=2390", "refsource": "CONFIRM", "url": "http://www.openldap.org/its/index.cgi?findid=2390" }, { "name": "9203", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/9203" }, { "name": "openldap-back-ldbm-dos(12520)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12520" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1201", "datePublished": "2005-05-10T04:00:00", "dateReserved": "2005-05-04T00:00:00", "dateUpdated": "2024-08-08T02:19:45.925Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-36221 (GCVE-0-2020-36221)
Vulnerability from cvelistv5
Published
2021-01-25 09:44
Modified
2024-08-04 17:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An integer underflow was discovered in OpenLDAP before 2.4.57 leading to slapd crashes in the Certificate Exact Assertion processing, resulting in denial of service (schema_init.c serialNumberAndIssuerCheck).
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:23:09.613Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9404" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/38ac838e4150c626bbfa0082b7e2cf3a2bb4df31" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9424" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/58c1748e81c843c5b6e61648d2a4d1d82b47e842" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212529" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212531" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An integer underflow was discovered in OpenLDAP before 2.4.57 leading to slapd crashes in the Certificate Exact Assertion processing, resulting in denial of service (schema_init.c serialNumberAndIssuerCheck)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-29T14:09:03", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9404" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/38ac838e4150c626bbfa0082b7e2cf3a2bb4df31" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9424" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/58c1748e81c843c5b6e61648d2a4d1d82b47e842" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212529" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212531" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-36221", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An integer underflow was discovered in OpenLDAP before 2.4.57 leading to slapd crashes in the Certificate Exact Assertion processing, resulting in denial of service (schema_init.c serialNumberAndIssuerCheck)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.openldap.org/show_bug.cgi?id=9404", "refsource": "MISC", "url": "https://bugs.openldap.org/show_bug.cgi?id=9404" }, { "name": "https://git.openldap.org/openldap/openldap/-/commit/38ac838e4150c626bbfa0082b7e2cf3a2bb4df31", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/commit/38ac838e4150c626bbfa0082b7e2cf3a2bb4df31" }, { "name": "https://bugs.openldap.org/show_bug.cgi?id=9424", "refsource": "MISC", "url": "https://bugs.openldap.org/show_bug.cgi?id=9424" }, { "name": "https://git.openldap.org/openldap/openldap/-/commit/58c1748e81c843c5b6e61648d2a4d1d82b47e842", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/commit/58c1748e81c843c5b6e61648d2a4d1d82b47e842" }, { "name": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4845" }, { "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "name": "https://support.apple.com/kb/HT212529", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "name": "https://support.apple.com/kb/HT212531", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212531" }, { "name": "https://support.apple.com/kb/HT212530", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-36221", "datePublished": "2021-01-25T09:44:47", "dateReserved": "2021-01-25T00:00:00", "dateUpdated": "2024-08-04T17:23:09.613Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-36225 (GCVE-0-2020-36225)
Vulnerability from cvelistv5
Published
2021-01-25 09:44
Modified
2024-08-04 17:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
A flaw was discovered in OpenLDAP before 2.4.57 leading to a double free and slapd crash in the saslAuthzTo processing, resulting in denial of service.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:23:09.758Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9412" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212529" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212531" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was discovered in OpenLDAP before 2.4.57 leading to a double free and slapd crash in the saslAuthzTo processing, resulting in denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-29T14:08:23", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9412" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212529" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212531" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-36225", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was discovered in OpenLDAP before 2.4.57 leading to a double free and slapd crash in the saslAuthzTo processing, resulting in denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "name": "https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65" }, { "name": "https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439" }, { "name": "https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26" }, { "name": "https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8" }, { "name": "https://bugs.openldap.org/show_bug.cgi?id=9412", "refsource": "MISC", "url": "https://bugs.openldap.org/show_bug.cgi?id=9412" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4845" }, { "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "name": "https://support.apple.com/kb/HT212529", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "name": "https://support.apple.com/kb/HT212531", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212531" }, { "name": "https://support.apple.com/kb/HT212530", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-36225", "datePublished": "2021-01-25T09:44:21", "dateReserved": "2021-01-25T00:00:00", "dateUpdated": "2024-08-04T17:23:09.758Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-8182 (GCVE-0-2014-8182)
Vulnerability from cvelistv5
Published
2020-01-02 22:20
Modified
2024-08-06 13:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Other
Summary
An off-by-one error leading to a crash was discovered in openldap 2.4 when processing DNS SRV messages. If slapd was configured to use the dnssrv backend, an attacker could crash the service with crafted DNS responses.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:10:51.060Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2014-8182" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-8182" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2014-8182" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://access.redhat.com/security/cve/cve-2014-8182" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "openldap", "vendor": "openldap", "versions": [ { "status": "affected", "version": "2.4" } ] } ], "descriptions": [ { "lang": "en", "value": "An off-by-one error leading to a crash was discovered in openldap 2.4 when processing DNS SRV messages. If slapd was configured to use the dnssrv backend, an attacker could crash the service with crafted DNS responses." } ], "problemTypes": [ { "descriptions": [ { "description": "Other", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-02T22:20:44", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2014-8182" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-8182" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2014-8182" }, { "tags": [ "x_refsource_MISC" ], "url": "https://access.redhat.com/security/cve/cve-2014-8182" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-8182", "datePublished": "2020-01-02T22:20:44", "dateReserved": "2014-10-10T00:00:00", "dateUpdated": "2024-08-06T13:10:51.060Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-25692 (GCVE-0-2020-25692)
Vulnerability from cvelistv5
Published
2020-12-08 00:06
Modified
2024-08-04 15:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A NULL pointer dereference was found in OpenLDAP server and was fixed in openldap 2.4.55, during a request for renaming RDNs. An unauthenticated attacker could remotely crash the slapd process by sending a specially crafted request, causing a Denial of Service.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:40:36.777Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894567" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210108-0006/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "openldap", "vendor": "n/a", "versions": [ { "status": "affected", "version": "openldap 2.4.55" } ] } ], "descriptions": [ { "lang": "en", "value": "A NULL pointer dereference was found in OpenLDAP server and was fixed in openldap 2.4.55, during a request for renaming RDNs. An unauthenticated attacker could remotely crash the slapd process by sending a specially crafted request, causing a Denial of Service." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-08T11:06:19", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894567" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210108-0006/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-25692", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "openldap", "version": { "version_data": [ { "version_value": "openldap 2.4.55" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A NULL pointer dereference was found in OpenLDAP server and was fixed in openldap 2.4.55, during a request for renaming RDNs. An unauthenticated attacker could remotely crash the slapd process by sending a specially crafted request, causing a Denial of Service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-476" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1894567", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894567" }, { "name": "https://security.netapp.com/advisory/ntap-20210108-0006/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210108-0006/" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-25692", "datePublished": "2020-12-08T00:06:29", "dateReserved": "2020-09-16T00:00:00", "dateUpdated": "2024-08-04T15:40:36.777Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-13057 (GCVE-0-2019-13057)
Vulnerability from cvelistv5
Published
2019-07-26 12:19
Modified
2024-08-04 23:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An issue was discovered in the server in OpenLDAP before 2.4.48. When the server administrator delegates rootDN (database admin) privileges for certain databases but wants to maintain isolation (e.g., for multi-tenant deployments), slapd does not properly stop a rootDN from requesting authorization as an identity from another database during a SASL bind or with a proxyAuthz (RFC 4370) control. (It is not a common configuration to deploy a system where the server administrator and a DB administrator enjoy different levels of trust.)
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:41:10.083Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-4078-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4078-1/" }, { "name": "[debian-lts-announce] 20190818 [SECURITY] [DLA 1891-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00024.html" }, { "name": "USN-4078-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4078-2/" }, { "name": "openSUSE-SU-2019:2157", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html" }, { "name": "openSUSE-SU-2019:2176", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html" }, { "name": "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "name": "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Dec/26" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT210788" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.openldap.org/its/?findid=9038" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.openldap.org/lists/openldap-announce/201907/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190822-0004/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the server in OpenLDAP before 2.4.48. When the server administrator delegates rootDN (database admin) privileges for certain databases but wants to maintain isolation (e.g., for multi-tenant deployments), slapd does not properly stop a rootDN from requesting authorization as an identity from another database during a SASL bind or with a proxyAuthz (RFC 4370) control. (It is not a common configuration to deploy a system where the server administrator and a DB administrator enjoy different levels of trust.)" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T23:20:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-4078-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4078-1/" }, { "name": "[debian-lts-announce] 20190818 [SECURITY] [DLA 1891-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00024.html" }, { "name": "USN-4078-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4078-2/" }, { "name": "openSUSE-SU-2019:2157", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html" }, { "name": "openSUSE-SU-2019:2176", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html" }, { "name": "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "name": "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Dec/26" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT210788" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.openldap.org/its/?findid=9038" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.openldap.org/lists/openldap-announce/201907/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190822-0004/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-13057", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the server in OpenLDAP before 2.4.48. When the server administrator delegates rootDN (database admin) privileges for certain databases but wants to maintain isolation (e.g., for multi-tenant deployments), slapd does not properly stop a rootDN from requesting authorization as an identity from another database during a SASL bind or with a proxyAuthz (RFC 4370) control. (It is not a common configuration to deploy a system where the server administrator and a DB administrator enjoy different levels of trust.)" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-4078-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4078-1/" }, { "name": "[debian-lts-announce] 20190818 [SECURITY] [DLA 1891-1] openldap security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00024.html" }, { "name": "USN-4078-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4078-2/" }, { "name": "openSUSE-SU-2019:2157", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html" }, { "name": "openSUSE-SU-2019:2176", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html" }, { "name": "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "name": "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Dec/26" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "name": "https://support.apple.com/kb/HT210788", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT210788" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" }, { "name": "https://www.openldap.org/its/?findid=9038", "refsource": "MISC", "url": "https://www.openldap.org/its/?findid=9038" }, { "name": "https://www.openldap.org/lists/openldap-announce/201907/msg00001.html", "refsource": "CONFIRM", "url": "https://www.openldap.org/lists/openldap-announce/201907/msg00001.html" }, { "name": "https://security.netapp.com/advisory/ntap-20190822-0004/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190822-0004/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-13057", "datePublished": "2019-07-26T12:19:25", "dateReserved": "2019-06-29T00:00:00", "dateUpdated": "2024-08-04T23:41:10.083Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-36223 (GCVE-0-2020-36223)
Vulnerability from cvelistv5
Published
2021-01-25 09:43
Modified
2024-08-04 17:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
A flaw was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Values Return Filter control handling, resulting in denial of service (double free and out-of-bounds read).
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:23:09.560Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9408" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/21981053a1195ae1555e23df4d9ac68d34ede9dd" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212529" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212531" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Values Return Filter control handling, resulting in denial of service (double free and out-of-bounds read)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-29T14:06:25", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9408" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/21981053a1195ae1555e23df4d9ac68d34ede9dd" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212529" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212531" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-36223", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Values Return Filter control handling, resulting in denial of service (double free and out-of-bounds read)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "name": "https://bugs.openldap.org/show_bug.cgi?id=9408", "refsource": "MISC", "url": "https://bugs.openldap.org/show_bug.cgi?id=9408" }, { "name": "https://git.openldap.org/openldap/openldap/-/commit/21981053a1195ae1555e23df4d9ac68d34ede9dd", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/commit/21981053a1195ae1555e23df4d9ac68d34ede9dd" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4845" }, { "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "name": "https://support.apple.com/kb/HT212529", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "name": "https://support.apple.com/kb/HT212531", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212531" }, { "name": "https://support.apple.com/kb/HT212530", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-36223", "datePublished": "2021-01-25T09:43:28", "dateReserved": "2021-01-25T00:00:00", "dateUpdated": "2024-08-04T17:23:09.560Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-5779 (GCVE-0-2006-5779)
Vulnerability from cvelistv5
Published
2006-11-07 18:00
Modified
2024-08-07 20:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
OpenLDAP before 2.3.29 allows remote attackers to cause a denial of service (daemon crash) via LDAP BIND requests with long authcid names, which triggers an assertion failure.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:04:55.595Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "23133", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23133" }, { "name": "SUSE-SA:2006:072", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2006_72_openldap2.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://gleg.net/vulndisco_meta.shtml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-820" }, { "name": "23170", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23170" }, { "name": "1017166", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017166" }, { "name": "2006-0066", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2006/0066/" }, { "name": "MDKSA-2006:208", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:208" }, { "name": "ADV-2006-4379", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4379" }, { "name": "20939", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/20939" }, { "name": "USN-384-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-384-1" }, { "name": "openldap-bind-dos(30076)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30076" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4740" }, { "name": "23152", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23152" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://gleg.net/downloads/VULNDISCO_META_FREE.tar.gz" }, { "name": "22996", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22996" }, { "name": "OpenPKG-SA-2006.033", "tags": [ "vendor-advisory", "x_refsource_OPENPKG", "x_transferred" ], "url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.033-openldap.html" }, { "name": "22953", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22953" }, { "name": "23125", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23125" }, { "name": "20061106 VulnDisco Pack for Metasploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/450728/100/0/threaded" }, { "name": "1831", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/1831" }, { "name": "GLSA-200611-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200611-25.xml" }, { "name": "22750", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22750" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-11-06T00:00:00", "descriptions": [ { "lang": "en", "value": "OpenLDAP before 2.3.29 allows remote attackers to cause a denial of service (daemon crash) via LDAP BIND requests with long authcid names, which triggers an assertion failure." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "23133", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23133" }, { "name": "SUSE-SA:2006:072", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2006_72_openldap2.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://gleg.net/vulndisco_meta.shtml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-820" }, { "name": "23170", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23170" }, { "name": "1017166", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017166" }, { "name": "2006-0066", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2006/0066/" }, { "name": "MDKSA-2006:208", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:208" }, { "name": "ADV-2006-4379", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4379" }, { "name": "20939", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/20939" }, { "name": "USN-384-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-384-1" }, { "name": "openldap-bind-dos(30076)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30076" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4740" }, { "name": "23152", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23152" }, { "tags": [ "x_refsource_MISC" ], "url": "http://gleg.net/downloads/VULNDISCO_META_FREE.tar.gz" }, { "name": "22996", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22996" }, { "name": "OpenPKG-SA-2006.033", "tags": [ "vendor-advisory", "x_refsource_OPENPKG" ], "url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.033-openldap.html" }, { "name": "22953", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22953" }, { "name": "23125", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23125" }, { "name": "20061106 VulnDisco Pack for Metasploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/450728/100/0/threaded" }, { "name": "1831", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/1831" }, { "name": "GLSA-200611-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200611-25.xml" }, { "name": "22750", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22750" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-5779", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenLDAP before 2.3.29 allows remote attackers to cause a denial of service (daemon crash) via LDAP BIND requests with long authcid names, which triggers an assertion failure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "23133", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23133" }, { "name": "SUSE-SA:2006:072", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2006_72_openldap2.html" }, { "name": "http://gleg.net/vulndisco_meta.shtml", "refsource": "MISC", "url": "http://gleg.net/vulndisco_meta.shtml" }, { "name": "https://issues.rpath.com/browse/RPL-820", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-820" }, { "name": "23170", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23170" }, { "name": "1017166", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017166" }, { "name": "2006-0066", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2006/0066/" }, { "name": "MDKSA-2006:208", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:208" }, { "name": "ADV-2006-4379", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/4379" }, { "name": "20939", "refsource": "BID", "url": "http://www.securityfocus.com/bid/20939" }, { "name": "USN-384-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-384-1" }, { "name": "openldap-bind-dos(30076)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30076" }, { "name": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4740", "refsource": "CONFIRM", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4740" }, { "name": "23152", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23152" }, { "name": "http://gleg.net/downloads/VULNDISCO_META_FREE.tar.gz", "refsource": "MISC", "url": "http://gleg.net/downloads/VULNDISCO_META_FREE.tar.gz" }, { "name": "22996", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22996" }, { "name": "OpenPKG-SA-2006.033", "refsource": "OPENPKG", "url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.033-openldap.html" }, { "name": "22953", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22953" }, { "name": "23125", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23125" }, { "name": "20061106 VulnDisco Pack for Metasploit", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/450728/100/0/threaded" }, { "name": "1831", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/1831" }, { "name": "GLSA-200611-25", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200611-25.xml" }, { "name": "22750", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22750" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-5779", "datePublished": "2006-11-07T18:00:00", "dateReserved": "2006-11-07T00:00:00", "dateUpdated": "2024-08-07T20:04:55.595Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-1025 (GCVE-0-2011-1025)
Vulnerability from cvelistv5
Published
2011-03-20 01:00
Modified
2024-08-06 22:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
bind.cpp in back-ndb in OpenLDAP 2.4.x before 2.4.24 does not require authentication for the root Distinguished Name (DN), which allows remote attackers to bypass intended access restrictions via an arbitrary password.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:14:27.305Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201406-36", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6661" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-ndb/bind.cpp.diff?r1=1.5\u0026r2=1.8" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680472" }, { "name": "1025190", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1025190" }, { "name": "[openldap-announce] 20110212 OpenLDAP 2.4.24 available", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openldap.org/lists/openldap-announce/201102/msg00000.html" }, { "name": "MDVSA-2011:056", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:056" }, { "name": "RHSA-2011:0347", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0347.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "[oss-security] 20110225 Re: CVE Request -- OpenLDAP -- two issue", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/02/25/13" }, { "name": "43718", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43718" }, { "name": "[oss-security] 20110224 CVE Request -- OpenLDAP -- two issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/02/24/12" }, { "name": "USN-1100-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1100-1" }, { "name": "ADV-2011-0665", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0665" }, { "name": "43331", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-12T00:00:00", "descriptions": [ { "lang": "en", "value": "bind.cpp in back-ndb in OpenLDAP 2.4.x before 2.4.24 does not require authentication for the root Distinguished Name (DN), which allows remote attackers to bypass intended access restrictions via an arbitrary password." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-04T17:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "GLSA-201406-36", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6661" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-ndb/bind.cpp.diff?r1=1.5\u0026r2=1.8" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680472" }, { "name": "1025190", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1025190" }, { "name": "[openldap-announce] 20110212 OpenLDAP 2.4.24 available", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openldap.org/lists/openldap-announce/201102/msg00000.html" }, { "name": "MDVSA-2011:056", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:056" }, { "name": "RHSA-2011:0347", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0347.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "[oss-security] 20110225 Re: CVE Request -- OpenLDAP -- two issue", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/02/25/13" }, { "name": "43718", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43718" }, { "name": "[oss-security] 20110224 CVE Request -- OpenLDAP -- two issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/02/24/12" }, { "name": "USN-1100-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1100-1" }, { "name": "ADV-2011-0665", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0665" }, { "name": "43331", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43331" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1025", "datePublished": "2011-03-20T01:00:00", "dateReserved": "2011-02-14T00:00:00", "dateUpdated": "2024-08-06T22:14:27.305Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-36228 (GCVE-0-2020-36228)
Vulnerability from cvelistv5
Published
2021-01-25 09:44
Modified
2024-08-04 17:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An integer underflow was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Certificate List Exact Assertion processing, resulting in denial of service.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:23:09.585Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9427" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/91dccd25c347733b365adc74cb07d074512ed5ad" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212529" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212531" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An integer underflow was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Certificate List Exact Assertion processing, resulting in denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-29T14:06:34", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9427" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/91dccd25c347733b365adc74cb07d074512ed5ad" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212529" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212531" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-36228", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An integer underflow was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Certificate List Exact Assertion processing, resulting in denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "name": "https://bugs.openldap.org/show_bug.cgi?id=9427", "refsource": "MISC", "url": "https://bugs.openldap.org/show_bug.cgi?id=9427" }, { "name": "https://git.openldap.org/openldap/openldap/-/commit/91dccd25c347733b365adc74cb07d074512ed5ad", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/commit/91dccd25c347733b365adc74cb07d074512ed5ad" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4845" }, { "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "name": "https://support.apple.com/kb/HT212529", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "name": "https://support.apple.com/kb/HT212531", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212531" }, { "name": "https://support.apple.com/kb/HT212530", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-36228", "datePublished": "2021-01-25T09:44:05", "dateReserved": "2021-01-25T00:00:00", "dateUpdated": "2024-08-04T17:23:09.585Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2002-1378 (GCVE-0-2002-1378)
Vulnerability from cvelistv5
Published
2002-12-17 05:00
Modified
2024-08-08 03:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple buffer overflows in OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allow remote attackers to execute arbitrary code via (1) long -t or -r parameters to slurpd, (2) a malicious ldapfilter.conf file that is not properly handled by getfilter functions, (3) a malicious ldaptemplates.conf that causes an overflow in libldap, (4) a certain access control list that causes an overflow in slapd, or (5) a long generated filename for logging rejected replication requests.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:19:28.908Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "6328", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/6328" }, { "name": "N-043", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://www.ciac.org/ciac/bulletins/n-043.shtml" }, { "name": "RHSA-2003:040", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-040.html" }, { "name": "200212-12", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.securityfocus.com/advisories/4827" }, { "name": "TLSA-2003-5", "tags": [ "vendor-advisory", "x_refsource_TURBO", "x_transferred" ], "url": "http://www.turbolinux.com/security/TLSA-2003-5.txt" }, { "name": "openldap-multiple-bo(10800)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10800" }, { "name": "SuSE-SA:2002:047", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2002_047_openldap2.html" }, { "name": "MDKSA-2003:006", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:006" }, { "name": "CLA-2002:556", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000556" }, { "name": "DSA-227", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2003/dsa-227" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.linuxsecurity.com/advisories/gentoo_advisory-2704.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-12-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allow remote attackers to execute arbitrary code via (1) long -t or -r parameters to slurpd, (2) a malicious ldapfilter.conf file that is not properly handled by getfilter functions, (3) a malicious ldaptemplates.conf that causes an overflow in libldap, (4) a certain access control list that causes an overflow in slapd, or (5) a long generated filename for logging rejected replication requests." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "6328", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/6328" }, { "name": "N-043", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://www.ciac.org/ciac/bulletins/n-043.shtml" }, { "name": "RHSA-2003:040", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-040.html" }, { "name": "200212-12", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.securityfocus.com/advisories/4827" }, { "name": "TLSA-2003-5", "tags": [ "vendor-advisory", "x_refsource_TURBO" ], "url": "http://www.turbolinux.com/security/TLSA-2003-5.txt" }, { "name": "openldap-multiple-bo(10800)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10800" }, { "name": "SuSE-SA:2002:047", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2002_047_openldap2.html" }, { "name": "MDKSA-2003:006", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:006" }, { "name": "CLA-2002:556", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000556" }, { "name": "DSA-227", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2003/dsa-227" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.linuxsecurity.com/advisories/gentoo_advisory-2704.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1378", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allow remote attackers to execute arbitrary code via (1) long -t or -r parameters to slurpd, (2) a malicious ldapfilter.conf file that is not properly handled by getfilter functions, (3) a malicious ldaptemplates.conf that causes an overflow in libldap, (4) a certain access control list that causes an overflow in slapd, or (5) a long generated filename for logging rejected replication requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "6328", "refsource": "BID", "url": "http://www.securityfocus.com/bid/6328" }, { "name": "N-043", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/n-043.shtml" }, { "name": "RHSA-2003:040", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-040.html" }, { "name": "200212-12", "refsource": "GENTOO", "url": "http://www.securityfocus.com/advisories/4827" }, { "name": "TLSA-2003-5", "refsource": "TURBO", "url": "http://www.turbolinux.com/security/TLSA-2003-5.txt" }, { "name": "openldap-multiple-bo(10800)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10800" }, { "name": "SuSE-SA:2002:047", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2002_047_openldap2.html" }, { "name": "MDKSA-2003:006", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:006" }, { "name": "CLA-2002:556", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000556" }, { "name": "DSA-227", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-227" }, { "name": "http://www.linuxsecurity.com/advisories/gentoo_advisory-2704.html", "refsource": "MISC", "url": "http://www.linuxsecurity.com/advisories/gentoo_advisory-2704.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1378", "datePublished": "2002-12-17T05:00:00", "dateReserved": "2002-12-16T00:00:00", "dateUpdated": "2024-08-08T03:19:28.908Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-0658 (GCVE-0-2008-0658)
Vulnerability from cvelistv5
Published
2008-02-13 20:00
Modified
2024-08-07 07:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
slapd/back-bdb/modrdn.c in the BDB backend for slapd in OpenLDAP 2.3.39 allows remote authenticated users to cause a denial of service (daemon crash) via a modrdn operation with a NOOP (LDAP_X_NO_OPERATION) control, a related issue to CVE-2007-6698.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:54:22.904Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SR:2008:010", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html" }, { "name": "MDVSA-2008:058", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:058" }, { "name": "29461", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29461" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-bdb/modrdn.c.diff?r1=1.197\u0026r2=1.198\u0026f=h" }, { "name": "29225", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29225" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0059" }, { "name": "29682", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29682" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0059" }, { "name": "29256", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29256" }, { "name": "20080212 rPSA-2008-0059-1 openldap openldap-clients openldap-servers", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/488242/100/200/threaded" }, { "name": "GLSA-200803-28", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200803-28.xml" }, { "name": "29068", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29068" }, { "name": "USN-584-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-584-1" }, { "name": "RHSA-2008:0110", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0110.html" }, { "name": "oval:org.mitre.oval:def:9470", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9470" }, { "name": "28953", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28953" }, { "name": "28914", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28914" }, { "name": "DSA-1541", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1541" }, { "name": "openldap-modrdn-dos(40479)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40479" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5358" }, { "name": "ADV-2009-3184", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3184" }, { "name": "28926", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28926" }, { "name": "27778", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27778" }, { "name": "ADV-2008-0536", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0536/references" }, { "name": "APPLE-SA-2009-11-09-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "name": "29957", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29957" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3937" }, { "name": "1019481", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019481" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-02-13T00:00:00", "descriptions": [ { "lang": "en", "value": "slapd/back-bdb/modrdn.c in the BDB backend for slapd in OpenLDAP 2.3.39 allows remote authenticated users to cause a denial of service (daemon crash) via a modrdn operation with a NOOP (LDAP_X_NO_OPERATION) control, a related issue to CVE-2007-6698." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "SUSE-SR:2008:010", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html" }, { "name": "MDVSA-2008:058", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:058" }, { "name": "29461", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29461" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-bdb/modrdn.c.diff?r1=1.197\u0026r2=1.198\u0026f=h" }, { "name": "29225", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29225" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0059" }, { "name": "29682", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29682" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0059" }, { "name": "29256", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29256" }, { "name": "20080212 rPSA-2008-0059-1 openldap openldap-clients openldap-servers", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/488242/100/200/threaded" }, { "name": "GLSA-200803-28", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200803-28.xml" }, { "name": "29068", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29068" }, { "name": "USN-584-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-584-1" }, { "name": "RHSA-2008:0110", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0110.html" }, { "name": "oval:org.mitre.oval:def:9470", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9470" }, { "name": "28953", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28953" }, { "name": "28914", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28914" }, { "name": "DSA-1541", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1541" }, { "name": "openldap-modrdn-dos(40479)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40479" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5358" }, { "name": "ADV-2009-3184", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3184" }, { "name": "28926", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28926" }, { "name": "27778", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27778" }, { "name": "ADV-2008-0536", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0536/references" }, { "name": "APPLE-SA-2009-11-09-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "name": "29957", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29957" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3937" }, { "name": "1019481", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019481" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-0658", "datePublished": "2008-02-13T20:00:00", "dateReserved": "2008-02-07T00:00:00", "dateUpdated": "2024-08-07T07:54:22.904Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-27212 (GCVE-0-2021-27212)
Vulnerability from cvelistv5
Published
2021-02-14 02:53
Modified
2024-08-03 20:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In OpenLDAP through 2.4.57 and 2.5.x through 2.5.1alpha, an assertion failure in slapd can occur in the issuerAndThisUpdateCheck function via a crafted packet, resulting in a denial of service (daemon exit) via a short timestamp. This is related to schema_init.c and checkTime.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:40:47.511Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9454" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/9badb73425a67768c09bcaed1a9c26c684af6c30" }, { "name": "[debian-lts-announce] 20210220 [SECURITY] [DLA 2574-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00035.html" }, { "name": "DSA-4860", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4860" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210319-0005/" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In OpenLDAP through 2.4.57 and 2.5.x through 2.5.1alpha, an assertion failure in slapd can occur in the issuerAndThisUpdateCheck function via a crafted packet, resulting in a denial of service (daemon exit) via a short timestamp. This is related to schema_init.c and checkTime." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-29T14:08:34", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9454" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/9badb73425a67768c09bcaed1a9c26c684af6c30" }, { "name": "[debian-lts-announce] 20210220 [SECURITY] [DLA 2574-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00035.html" }, { "name": "DSA-4860", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4860" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210319-0005/" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-27212", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In OpenLDAP through 2.4.57 and 2.5.x through 2.5.1alpha, an assertion failure in slapd can occur in the issuerAndThisUpdateCheck function via a crafted packet, resulting in a denial of service (daemon exit) via a short timestamp. This is related to schema_init.c and checkTime." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.openldap.org/show_bug.cgi?id=9454", "refsource": "MISC", "url": "https://bugs.openldap.org/show_bug.cgi?id=9454" }, { "name": "https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0" }, { "name": "https://git.openldap.org/openldap/openldap/-/commit/9badb73425a67768c09bcaed1a9c26c684af6c30", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/commit/9badb73425a67768c09bcaed1a9c26c684af6c30" }, { "name": "[debian-lts-announce] 20210220 [SECURITY] [DLA 2574-1] openldap security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00035.html" }, { "name": "DSA-4860", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4860" }, { "name": "https://security.netapp.com/advisory/ntap-20210319-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210319-0005/" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-27212", "datePublished": "2021-02-14T02:53:26", "dateReserved": "2021-02-14T00:00:00", "dateUpdated": "2024-08-03T20:40:47.511Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-3276 (GCVE-0-2015-3276)
Vulnerability from cvelistv5
Published
2015-12-07 20:00
Modified
2024-08-06 05:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:39:32.077Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2015:2131", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2131.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1238322" }, { "name": "1034221", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034221" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-11-19T00:00:00", "descriptions": [ { "lang": "en", "value": "The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-12T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2015:2131", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2131.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1238322" }, { "name": "1034221", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034221" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-3276", "datePublished": "2015-12-07T20:00:00", "dateReserved": "2015-04-10T00:00:00", "dateUpdated": "2024-08-06T05:39:32.077Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-15719 (GCVE-0-2020-15719)
Vulnerability from cvelistv5
Published
2020-07-14 13:47
Modified
2024-08-04 13:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:22:30.718Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1740070" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9266" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://access.redhat.com/errata/RHBA-2019:3674" }, { "name": "openSUSE-SU-2020:1416", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html" }, { "name": "openSUSE-SU-2020:1459", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T23:21:45", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1740070" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9266" }, { "tags": [ "x_refsource_MISC" ], "url": "https://access.redhat.com/errata/RHBA-2019:3674" }, { "name": "openSUSE-SU-2020:1416", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html" }, { "name": "openSUSE-SU-2020:1459", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-15719", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1740070", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1740070" }, { "name": "https://bugs.openldap.org/show_bug.cgi?id=9266", "refsource": "MISC", "url": "https://bugs.openldap.org/show_bug.cgi?id=9266" }, { "name": "https://access.redhat.com/errata/RHBA-2019:3674", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHBA-2019:3674" }, { "name": "openSUSE-SU-2020:1416", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html" }, { "name": "openSUSE-SU-2020:1459", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-15719", "datePublished": "2020-07-14T13:47:31", "dateReserved": "2020-07-14T00:00:00", "dateUpdated": "2024-08-04T13:22:30.718Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-36227 (GCVE-0-2020-36227)
Vulnerability from cvelistv5
Published
2021-01-25 09:43
Modified
2024-08-04 17:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
A flaw was discovered in OpenLDAP before 2.4.57 leading to an infinite loop in slapd with the cancel_extop Cancel operation, resulting in denial of service.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:23:09.807Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9428" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/9d0e8485f3113505743baabf1167e01e4558ccf5" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212529" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212531" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was discovered in OpenLDAP before 2.4.57 leading to an infinite loop in slapd with the cancel_extop Cancel operation, resulting in denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-29T14:06:59", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9428" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/9d0e8485f3113505743baabf1167e01e4558ccf5" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212529" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212531" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-36227", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was discovered in OpenLDAP before 2.4.57 leading to an infinite loop in slapd with the cancel_extop Cancel operation, resulting in denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "name": "https://bugs.openldap.org/show_bug.cgi?id=9428", "refsource": "MISC", "url": "https://bugs.openldap.org/show_bug.cgi?id=9428" }, { "name": "https://git.openldap.org/openldap/openldap/-/commit/9d0e8485f3113505743baabf1167e01e4558ccf5", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/commit/9d0e8485f3113505743baabf1167e01e4558ccf5" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4845" }, { "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "name": "https://support.apple.com/kb/HT212529", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "name": "https://support.apple.com/kb/HT212531", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212531" }, { "name": "https://support.apple.com/kb/HT212530", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-36227", "datePublished": "2021-01-25T09:43:37", "dateReserved": "2021-01-25T00:00:00", "dateUpdated": "2024-08-04T17:23:09.807Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-2952 (GCVE-0-2008-2952)
Vulnerability from cvelistv5
Published
2008-07-01 21:00
Modified
2024-08-07 09:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
liblber/io.c in OpenLDAP 2.2.4 to 2.4.10 allows remote attackers to cause a denial of service (program termination) via crafted ASN.1 BER datagrams that trigger an assertion error.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:21:34.530Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2008:0583", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0583.html" }, { "name": "GLSA-200808-09", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200808-09.xml" }, { "name": "31364", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31364" }, { "name": "oval:org.mitre.oval:def:10662", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10662" }, { "name": "30917", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30917" }, { "name": "APPLE-SA-2008-07-31", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html" }, { "name": "openldap-bergetnext-dos(43515)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43515" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5580%3Bselectid=5580" }, { "name": "DSA-1650", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1650" }, { "name": "30013", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/30013" }, { "name": "[oss-security 20080701 Re: [oss-security] openldap DoS", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2008/07/01/2" }, { "name": "ADV-2008-2268", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2268" }, { "name": "20080811 rPSA-2008-0249-1 openldap openldap-clients openldap-servers", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/495320/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-2645" }, { "name": "30996", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30996" }, { "name": "31436", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31436" }, { "name": "SUSE-SR:2008:021", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html" }, { "name": "MDVSA-2008:144", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:144" }, { "name": "[oss-security] 20080713 Re: openldap DoS", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2008/07/13/2" }, { "name": "USN-634-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-634-1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-052/" }, { "name": "30853", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30853" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0249" }, { "name": "31326", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31326" }, { "name": "FEDORA-2008-6062", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00129.html" }, { "name": "32254", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32254" }, { "name": "1020405", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020405" }, { "name": "ADV-2008-1978", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1978/references" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5580" }, { "name": "FEDORA-2008-6029", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00109.html" }, { "name": "32316", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32316" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-06-26T00:00:00", "descriptions": [ { "lang": "en", "value": "liblber/io.c in OpenLDAP 2.2.4 to 2.4.10 allows remote attackers to cause a denial of service (program termination) via crafted ASN.1 BER datagrams that trigger an assertion error." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2008:0583", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0583.html" }, { "name": "GLSA-200808-09", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200808-09.xml" }, { "name": "31364", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31364" }, { "name": "oval:org.mitre.oval:def:10662", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10662" }, { "name": "30917", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30917" }, { "name": "APPLE-SA-2008-07-31", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html" }, { "name": "openldap-bergetnext-dos(43515)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43515" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5580%3Bselectid=5580" }, { "name": "DSA-1650", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1650" }, { "name": "30013", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/30013" }, { "name": "[oss-security 20080701 Re: [oss-security] openldap DoS", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2008/07/01/2" }, { "name": "ADV-2008-2268", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2268" }, { "name": "20080811 rPSA-2008-0249-1 openldap openldap-clients openldap-servers", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/495320/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-2645" }, { "name": "30996", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30996" }, { "name": "31436", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31436" }, { "name": "SUSE-SR:2008:021", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html" }, { "name": "MDVSA-2008:144", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:144" }, { "name": "[oss-security] 20080713 Re: openldap DoS", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2008/07/13/2" }, { "name": "USN-634-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-634-1" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-052/" }, { "name": "30853", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30853" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0249" }, { "name": "31326", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31326" }, { "name": "FEDORA-2008-6062", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00129.html" }, { "name": "32254", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32254" }, { "name": "1020405", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020405" }, { "name": "ADV-2008-1978", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1978/references" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5580" }, { "name": "FEDORA-2008-6029", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00109.html" }, { "name": "32316", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32316" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-2952", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "liblber/io.c in OpenLDAP 2.2.4 to 2.4.10 allows remote attackers to cause a denial of service (program termination) via crafted ASN.1 BER datagrams that trigger an assertion error." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2008:0583", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0583.html" }, { "name": "GLSA-200808-09", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200808-09.xml" }, { "name": "31364", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31364" }, { "name": "oval:org.mitre.oval:def:10662", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10662" }, { "name": "30917", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30917" }, { "name": "APPLE-SA-2008-07-31", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html" }, { "name": "openldap-bergetnext-dos(43515)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43515" }, { "name": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5580;selectid=5580", "refsource": "CONFIRM", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5580;selectid=5580" }, { "name": "DSA-1650", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1650" }, { "name": "30013", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30013" }, { "name": "[oss-security 20080701 Re: [oss-security] openldap DoS", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2008/07/01/2" }, { "name": "ADV-2008-2268", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2268" }, { "name": "20080811 rPSA-2008-0249-1 openldap openldap-clients openldap-servers", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/495320/100/0/threaded" }, { "name": "https://issues.rpath.com/browse/RPL-2645", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-2645" }, { "name": "30996", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30996" }, { "name": "31436", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31436" }, { "name": "SUSE-SR:2008:021", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html" }, { "name": "MDVSA-2008:144", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:144" }, { "name": "[oss-security] 20080713 Re: openldap DoS", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2008/07/13/2" }, { "name": "USN-634-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-634-1" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-08-052/", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-052/" }, { "name": "30853", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30853" }, { "name": "http://wiki.rpath.com/Advisories:rPSA-2008-0249", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0249" }, { "name": "31326", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31326" }, { "name": "FEDORA-2008-6062", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00129.html" }, { "name": "32254", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32254" }, { "name": "1020405", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020405" }, { "name": "ADV-2008-1978", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1978/references" }, { "name": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5580", "refsource": "CONFIRM", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5580" }, { "name": "FEDORA-2008-6029", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00109.html" }, { "name": "32316", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32316" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-2952", "datePublished": "2008-07-01T21:00:00", "dateReserved": "2008-07-01T00:00:00", "dateUpdated": "2024-08-07T09:21:34.530Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2002-0045 (GCVE-0-2002-0045)
Vulnerability from cvelistv5
Published
2002-06-25 04:00
Modified
2024-08-08 02:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
slapd in OpenLDAP 2.0 through 2.0.19 allows local users, and anonymous users before 2.0.8, to conduct a "replace" action on access controls without any values, which causes OpenLDAP to delete non-mandatory attributes that would otherwise be protected by ACLs.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:35:17.451Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "HPSBTL0201-020", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0201-020" }, { "name": "CLA-2002:459", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000459" }, { "name": "RHSA-2002:014", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-014.html" }, { "name": "3945", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3945" }, { "name": "CSSA-2002-001.0", "tags": [ "vendor-advisory", "x_refsource_CALDERA", "x_transferred" ], "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-001.0.txt" }, { "name": "5395", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/5395" }, { "name": "openldap-slapd-delete-attributes(7978)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7978" }, { "name": "MDKSA-2002:013", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:013" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/lists/openldap-announce/200201/msg00002.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-01-14T00:00:00", "descriptions": [ { "lang": "en", "value": "slapd in OpenLDAP 2.0 through 2.0.19 allows local users, and anonymous users before 2.0.8, to conduct a \"replace\" action on access controls without any values, which causes OpenLDAP to delete non-mandatory attributes that would otherwise be protected by ACLs." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-06-16T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "HPSBTL0201-020", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0201-020" }, { "name": "CLA-2002:459", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000459" }, { "name": "RHSA-2002:014", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-014.html" }, { "name": "3945", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3945" }, { "name": "CSSA-2002-001.0", "tags": [ "vendor-advisory", "x_refsource_CALDERA" ], "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-001.0.txt" }, { "name": "5395", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/5395" }, { "name": "openldap-slapd-delete-attributes(7978)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7978" }, { "name": "MDKSA-2002:013", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:013" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/lists/openldap-announce/200201/msg00002.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0045", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "slapd in OpenLDAP 2.0 through 2.0.19 allows local users, and anonymous users before 2.0.8, to conduct a \"replace\" action on access controls without any values, which causes OpenLDAP to delete non-mandatory attributes that would otherwise be protected by ACLs." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "HPSBTL0201-020", "refsource": "HP", "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0201-020" }, { "name": "CLA-2002:459", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000459" }, { "name": "RHSA-2002:014", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2002-014.html" }, { "name": "3945", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3945" }, { "name": "CSSA-2002-001.0", "refsource": "CALDERA", "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-001.0.txt" }, { "name": "5395", "refsource": "OSVDB", "url": "http://www.osvdb.org/5395" }, { "name": "openldap-slapd-delete-attributes(7978)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7978" }, { "name": "MDKSA-2002:013", "refsource": "MANDRAKE", "url": "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:013" }, { "name": "http://www.openldap.org/lists/openldap-announce/200201/msg00002.html", "refsource": "CONFIRM", "url": "http://www.openldap.org/lists/openldap-announce/200201/msg00002.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0045", "datePublished": "2002-06-25T04:00:00", "dateReserved": "2002-01-22T00:00:00", "dateUpdated": "2024-08-08T02:35:17.451Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-17740 (GCVE-0-2017-17740)
Vulnerability from cvelistv5
Published
2017-12-18 06:00
Modified
2024-08-05 20:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:59:17.662Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2019:2157", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html" }, { "name": "openSUSE-SU-2019:2176", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openldap.org/its/index.cgi/Incoming?id=8759" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-12-18T00:00:00", "descriptions": [ { "lang": "en", "value": "contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T23:19:16", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "openSUSE-SU-2019:2157", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html" }, { "name": "openSUSE-SU-2019:2176", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openldap.org/its/index.cgi/Incoming?id=8759" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-17740", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2019:2157", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html" }, { "name": "openSUSE-SU-2019:2176", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "name": "http://www.openldap.org/its/index.cgi/Incoming?id=8759", "refsource": "MISC", "url": "http://www.openldap.org/its/index.cgi/Incoming?id=8759" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-17740", "datePublished": "2017-12-18T06:00:00", "dateReserved": "2017-12-18T00:00:00", "dateUpdated": "2024-08-05T20:59:17.662Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-29155 (GCVE-0-2022-29155)
Vulnerability from cvelistv5
Published
2022-05-04 19:06
Modified
2024-08-03 06:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In OpenLDAP 2.x before 2.5.12 and 2.6.x before 2.6.2, a SQL injection vulnerability exists in the experimental back-sql backend to slapd, via a SQL statement within an LDAP query. This can occur during an LDAP search operation when the search filter is processed, due to a lack of proper escaping.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:10:59.269Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9815" }, { "name": "DSA-5140", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5140" }, { "name": "[debian-lts-announce] 20220524 [SECURITY] [DLA 3017-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220609-0007/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In OpenLDAP 2.x before 2.5.12 and 2.6.x before 2.6.2, a SQL injection vulnerability exists in the experimental back-sql backend to slapd, via a SQL statement within an LDAP query. This can occur during an LDAP search operation when the search filter is processed, due to a lack of proper escaping." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-09T18:06:18", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9815" }, { "name": "DSA-5140", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2022/dsa-5140" }, { "name": "[debian-lts-announce] 20220524 [SECURITY] [DLA 3017-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20220609-0007/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-29155", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In OpenLDAP 2.x before 2.5.12 and 2.6.x before 2.6.2, a SQL injection vulnerability exists in the experimental back-sql backend to slapd, via a SQL statement within an LDAP query. This can occur during an LDAP search operation when the search filter is processed, due to a lack of proper escaping." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.openldap.org/show_bug.cgi?id=9815", "refsource": "MISC", "url": "https://bugs.openldap.org/show_bug.cgi?id=9815" }, { "name": "DSA-5140", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2022/dsa-5140" }, { "name": "[debian-lts-announce] 20220524 [SECURITY] [DLA 3017-1] openldap security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html" }, { "name": "https://security.netapp.com/advisory/ntap-20220609-0007/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220609-0007/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-29155", "datePublished": "2022-05-04T19:06:09", "dateReserved": "2022-04-13T00:00:00", "dateUpdated": "2024-08-03T06:10:59.269Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-1024 (GCVE-0-2011-1024)
Vulnerability from cvelistv5
Published
2011-03-20 01:00
Modified
2024-08-06 22:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
chain.c in back-ldap in OpenLDAP 2.4.x before 2.4.24, when a master-slave configuration with a chain overlay and ppolicy_forward_updates (aka authentication-failure forwarding) is used, allows remote authenticated users to bypass external-program authentication by sending an invalid password to a slave server.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:14:27.232Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201406-36", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "name": "RHSA-2011:0346", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0346.html" }, { "name": "1025188", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1025188" }, { "name": "43708", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43708" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6607" }, { "name": "[openldap-technical] 20100429 ppolicy master/slave issue", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openldap.org/lists/openldap-technical/201004/msg00247.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-ldap/chain.c.diff?r1=1.76\u0026r2=1.77\u0026hideattic=1\u0026sortbydate=0" }, { "name": "[openldap-announce] 20110212 OpenLDAP 2.4.24 available", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openldap.org/lists/openldap-announce/201102/msg00000.html" }, { "name": "MDVSA-2011:056", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:056" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=674985" }, { "name": "[oss-security] 20110225 Re: CVE Request -- OpenLDAP -- two issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/02/25/13" }, { "name": "RHSA-2011:0347", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0347.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "MDVSA-2011:055", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:055" }, { "name": "43718", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43718" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680466" }, { "name": "[oss-security] 20110224 CVE Request -- OpenLDAP -- two issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/02/24/12" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10735" }, { "name": "USN-1100-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1100-1" }, { "name": "ADV-2011-0665", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0665" }, { "name": "43331", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-04-29T00:00:00", "descriptions": [ { "lang": "en", "value": "chain.c in back-ldap in OpenLDAP 2.4.x before 2.4.24, when a master-slave configuration with a chain overlay and ppolicy_forward_updates (aka authentication-failure forwarding) is used, allows remote authenticated users to bypass external-program authentication by sending an invalid password to a slave server." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-04T17:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "GLSA-201406-36", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "name": "RHSA-2011:0346", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0346.html" }, { "name": "1025188", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1025188" }, { "name": "43708", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43708" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6607" }, { "name": "[openldap-technical] 20100429 ppolicy master/slave issue", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openldap.org/lists/openldap-technical/201004/msg00247.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-ldap/chain.c.diff?r1=1.76\u0026r2=1.77\u0026hideattic=1\u0026sortbydate=0" }, { "name": "[openldap-announce] 20110212 OpenLDAP 2.4.24 available", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openldap.org/lists/openldap-announce/201102/msg00000.html" }, { "name": "MDVSA-2011:056", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:056" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=674985" }, { "name": "[oss-security] 20110225 Re: CVE Request -- OpenLDAP -- two issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/02/25/13" }, { "name": "RHSA-2011:0347", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0347.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "MDVSA-2011:055", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:055" }, { "name": "43718", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43718" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680466" }, { "name": "[oss-security] 20110224 CVE Request -- OpenLDAP -- two issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/02/24/12" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10735" }, { "name": "USN-1100-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1100-1" }, { "name": "ADV-2011-0665", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0665" }, { "name": "43331", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43331" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1024", "datePublished": "2011-03-20T01:00:00", "dateReserved": "2011-02-14T00:00:00", "dateUpdated": "2024-08-06T22:14:27.232Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-6908 (GCVE-0-2015-6908)
Vulnerability from cvelistv5
Published
2015-09-11 16:00
Modified
2024-08-06 07:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The ber_get_next function in libraries/liblber/io.c in OpenLDAP 2.4.42 and earlier allows remote attackers to cause a denial of service (reachable assertion and application crash) via crafted BER data, as demonstrated by an attack against slapd.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:36:34.937Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "76714", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/76714" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.security-assessment.com/files/documents/advisory/OpenLDAP-ber_get_next-Denial-of-Service.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT205637" }, { "name": "openSUSE-SU-2016:0255", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html" }, { "name": "SUSE-SU-2016:0224", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commit%3Bh=6fe51a9ab04fd28bbc171da3cf12f1c1040d6629" }, { "name": "DSA-3356", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3356" }, { "name": "APPLE-SA-2015-12-08-3", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "USN-2742-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2742-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=8240" }, { "name": "RHSA-2015:1840", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1840.html" }, { "name": "1033534", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033534" }, { "name": "openSUSE-SU-2016:0261", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html" }, { "name": "SUSE-SU-2016:0262", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html" }, { "name": "openSUSE-SU-2016:0226", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-09-09T00:00:00", "descriptions": [ { "lang": "en", "value": "The ber_get_next function in libraries/liblber/io.c in OpenLDAP 2.4.42 and earlier allows remote attackers to cause a denial of service (reachable assertion and application crash) via crafted BER data, as demonstrated by an attack against slapd." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-20T16:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "76714", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/76714" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.security-assessment.com/files/documents/advisory/OpenLDAP-ber_get_next-Denial-of-Service.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT205637" }, { "name": "openSUSE-SU-2016:0255", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html" }, { "name": "SUSE-SU-2016:0224", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commit%3Bh=6fe51a9ab04fd28bbc171da3cf12f1c1040d6629" }, { "name": "DSA-3356", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3356" }, { "name": "APPLE-SA-2015-12-08-3", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "USN-2742-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2742-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=8240" }, { "name": "RHSA-2015:1840", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1840.html" }, { "name": "1033534", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1033534" }, { "name": "openSUSE-SU-2016:0261", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html" }, { "name": "SUSE-SU-2016:0262", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html" }, { "name": "openSUSE-SU-2016:0226", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2015-6908", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ber_get_next function in libraries/liblber/io.c in OpenLDAP 2.4.42 and earlier allows remote attackers to cause a denial of service (reachable assertion and application crash) via crafted BER data, as demonstrated by an attack against slapd." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "76714", "refsource": "BID", "url": "http://www.securityfocus.com/bid/76714" }, { "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "name": "http://www.security-assessment.com/files/documents/advisory/OpenLDAP-ber_get_next-Denial-of-Service.pdf", "refsource": "CONFIRM", "url": "http://www.security-assessment.com/files/documents/advisory/OpenLDAP-ber_get_next-Denial-of-Service.pdf" }, { "name": "https://support.apple.com/HT205637", "refsource": "CONFIRM", "url": "https://support.apple.com/HT205637" }, { "name": "openSUSE-SU-2016:0255", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html" }, { "name": "SUSE-SU-2016:0224", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html" }, { "name": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=6fe51a9ab04fd28bbc171da3cf12f1c1040d6629", "refsource": "CONFIRM", "url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=6fe51a9ab04fd28bbc171da3cf12f1c1040d6629" }, { "name": "DSA-3356", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3356" }, { "name": "APPLE-SA-2015-12-08-3", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "USN-2742-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2742-1" }, { "name": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=8240", "refsource": "CONFIRM", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=8240" }, { "name": "RHSA-2015:1840", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1840.html" }, { "name": "1033534", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1033534" }, { "name": "openSUSE-SU-2016:0261", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html" }, { "name": "SUSE-SU-2016:0262", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html" }, { "name": "openSUSE-SU-2016:0226", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2015-6908", "datePublished": "2015-09-11T16:00:00", "dateReserved": "2015-09-11T00:00:00", "dateUpdated": "2024-08-06T07:36:34.937Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-2069 (GCVE-0-2005-2069)
Vulnerability from cvelistv5
Published
2005-06-29 04:00
Modified
2024-08-07 22:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:15:37.352Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=161990" }, { "name": "GLSA-2005-07-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200507-13.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=96767" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-157.htm" }, { "name": "14126", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14126" }, { "name": "RHSA-2005:751", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-751.html" }, { "name": "ldap-tls-information-disclosure(21245)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21245" }, { "name": "17692", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/17692" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openldap.org/its/index.cgi/Incoming?id=3791" }, { "name": "20050704 pam_ldap/nss_ldap password leak in a master+slave+start_tls LDAP setup", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-07/0060.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugzilla.padl.com/show_bug.cgi?id=210" }, { "name": "17845", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17845" }, { "name": "14125", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14125" }, { "name": "oval:org.mitre.oval:def:9445", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9445" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugzilla.padl.com/show_bug.cgi?id=211" }, { "name": "MDKSA-2005:121", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:121" }, { "name": "21520", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21520" }, { "name": "RHSA-2005:767", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-767.html" }, { "name": "17233", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17233" }, { "name": "USN-152-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-152-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-06-28T00:00:00", "descriptions": [ { "lang": "en", "value": "pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=161990" }, { "name": "GLSA-2005-07-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200507-13.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=96767" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-157.htm" }, { "name": "14126", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14126" }, { "name": "RHSA-2005:751", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-751.html" }, { "name": "ldap-tls-information-disclosure(21245)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21245" }, { "name": "17692", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/17692" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openldap.org/its/index.cgi/Incoming?id=3791" }, { "name": "20050704 pam_ldap/nss_ldap password leak in a master+slave+start_tls LDAP setup", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-07/0060.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugzilla.padl.com/show_bug.cgi?id=210" }, { "name": "17845", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17845" }, { "name": "14125", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14125" }, { "name": "oval:org.mitre.oval:def:9445", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9445" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugzilla.padl.com/show_bug.cgi?id=211" }, { "name": "MDKSA-2005:121", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:121" }, { "name": "21520", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21520" }, { "name": "RHSA-2005:767", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-767.html" }, { "name": "17233", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17233" }, { "name": "USN-152-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-152-1" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2005-2069", "datePublished": "2005-06-29T04:00:00", "dateReserved": "2005-06-29T00:00:00", "dateUpdated": "2024-08-07T22:15:37.352Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-36230 (GCVE-0-2020-36230)
Vulnerability from cvelistv5
Published
2021-01-25 09:43
Modified
2024-08-04 17:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
A flaw was discovered in OpenLDAP before 2.4.57 leading in an assertion failure in slapd in the X.509 DN parsing in decode.c ber_next_element, resulting in denial of service.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:23:09.629Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9423" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/8c1d96ee36ed98b32cd0e28b7069c7b8ea09d793" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212529" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212531" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was discovered in OpenLDAP before 2.4.57 leading in an assertion failure in slapd in the X.509 DN parsing in decode.c ber_next_element, resulting in denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-29T14:09:16", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9423" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/8c1d96ee36ed98b32cd0e28b7069c7b8ea09d793" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212529" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212531" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-36230", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was discovered in OpenLDAP before 2.4.57 leading in an assertion failure in slapd in the X.509 DN parsing in decode.c ber_next_element, resulting in denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "name": "https://bugs.openldap.org/show_bug.cgi?id=9423", "refsource": "MISC", "url": "https://bugs.openldap.org/show_bug.cgi?id=9423" }, { "name": "https://git.openldap.org/openldap/openldap/-/commit/8c1d96ee36ed98b32cd0e28b7069c7b8ea09d793", "refsource": "MISC", "url": "https://git.openldap.org/openldap/openldap/-/commit/8c1d96ee36ed98b32cd0e28b7069c7b8ea09d793" }, { "name": "[debian-lts-announce] 20210203 [SECURITY] [DLA 2544-1] openldap security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "name": "DSA-4845", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4845" }, { "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "name": "https://support.apple.com/kb/HT212529", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "name": "https://support.apple.com/kb/HT212531", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212531" }, { "name": "https://support.apple.com/kb/HT212530", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212530" }, { "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-36230", "datePublished": "2021-01-25T09:43:47", "dateReserved": "2021-01-25T00:00:00", "dateUpdated": "2024-08-04T17:23:09.629Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-0823 (GCVE-0-2004-0823)
Vulnerability from cvelistv5
Published
2005-04-14 04:00
Modified
2024-08-08 00:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
OpenLDAP 1.0 through 2.1.19, as used in Apple Mac OS 10.3.4 and 10.3.5 and possibly other operating systems, may allow certain authentication schemes to use hashed (crypt) passwords in the userPassword attribute as if they were plaintext passwords, which allows remote attackers to re-use hashed passwords without decrypting them.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:31:47.659Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openldap-crypt-gain-access(17300)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17300" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-157.htm" }, { "name": "RHSA-2005:751", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-751.html" }, { "name": "12491", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/12491/" }, { "name": "11137", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11137" }, { "name": "ESB-2004.0559", "tags": [ "third-party-advisory", "x_refsource_AUSCERT", "x_transferred" ], "url": "http://www.auscert.org.au/render.html?it=4363" }, { "name": "21520", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21520" }, { "name": "APPLE-SA-2004-09-07", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://www.securityfocus.com/advisories/7148" }, { "name": "17233", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17233" }, { "name": "oval:org.mitre.oval:def:10703", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10703" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-08T00:00:00", "descriptions": [ { "lang": "en", "value": "OpenLDAP 1.0 through 2.1.19, as used in Apple Mac OS 10.3.4 and 10.3.5 and possibly other operating systems, may allow certain authentication schemes to use hashed (crypt) passwords in the userPassword attribute as if they were plaintext passwords, which allows remote attackers to re-use hashed passwords without decrypting them." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "openldap-crypt-gain-access(17300)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17300" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-157.htm" }, { "name": "RHSA-2005:751", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-751.html" }, { "name": "12491", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/12491/" }, { "name": "11137", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11137" }, { "name": "ESB-2004.0559", "tags": [ "third-party-advisory", "x_refsource_AUSCERT" ], "url": "http://www.auscert.org.au/render.html?it=4363" }, { "name": "21520", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21520" }, { "name": "APPLE-SA-2004-09-07", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://www.securityfocus.com/advisories/7148" }, { "name": "17233", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17233" }, { "name": "oval:org.mitre.oval:def:10703", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10703" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0823", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenLDAP 1.0 through 2.1.19, as used in Apple Mac OS 10.3.4 and 10.3.5 and possibly other operating systems, may allow certain authentication schemes to use hashed (crypt) passwords in the userPassword attribute as if they were plaintext passwords, which allows remote attackers to re-use hashed passwords without decrypting them." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openldap-crypt-gain-access(17300)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17300" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-157.htm", "refsource": "CONFIRM", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-157.htm" }, { "name": "RHSA-2005:751", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-751.html" }, { "name": "12491", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/12491/" }, { "name": "11137", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11137" }, { "name": "ESB-2004.0559", "refsource": "AUSCERT", "url": "http://www.auscert.org.au/render.html?it=4363" }, { "name": "21520", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21520" }, { "name": "APPLE-SA-2004-09-07", "refsource": "APPLE", "url": "http://www.securityfocus.com/advisories/7148" }, { "name": "17233", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17233" }, { "name": "oval:org.mitre.oval:def:10703", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10703" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0823", "datePublished": "2005-04-14T04:00:00", "dateReserved": "2004-08-27T00:00:00", "dateUpdated": "2024-08-08T00:31:47.659Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-14159 (GCVE-0-2017-14159)
Vulnerability from cvelistv5
Published
2017-09-05 18:00
Modified
2024-08-05 19:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command, as demonstrated by openldap-initscript.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:20:41.454Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openldap.org/its/index.cgi?findid=8703" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-09-05T00:00:00", "descriptions": [ { "lang": "en", "value": "slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a \"kill `cat /pathname`\" command, as demonstrated by openldap-initscript." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T23:19:14", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openldap.org/its/index.cgi?findid=8703" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-14159", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a \"kill `cat /pathname`\" command, as demonstrated by openldap-initscript." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "name": "http://www.openldap.org/its/index.cgi?findid=8703", "refsource": "MISC", "url": "http://www.openldap.org/its/index.cgi?findid=8703" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-14159", "datePublished": "2017-09-05T18:00:00", "dateReserved": "2017-09-05T00:00:00", "dateUpdated": "2024-08-05T19:20:41.454Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-6493 (GCVE-0-2006-6493)
Vulnerability from cvelistv5
Published
2006-12-13 00:00
Modified
2024-08-07 20:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in the krbv4_ldap_auth function in servers/slapd/kerberos.c in OpenLDAP 2.4.3 and earlier, when OpenLDAP is compiled with the --enable-kbind (Kerberos KBIND) option, allows remote attackers to execute arbitrary code via an LDAP bind request using the LDAP_AUTH_KRBV41 authentication method and long credential data.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:26:46.571Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20061212 OpenLDAP kbind authentication buffer overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/454181/30/0/threaded" }, { "name": "2023", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2023" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.phreedom.org/solar/exploits/openldap-kbind" }, { "name": "23334", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23334" }, { "name": "ADV-2006-4964", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4964" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-12-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the krbv4_ldap_auth function in servers/slapd/kerberos.c in OpenLDAP 2.4.3 and earlier, when OpenLDAP is compiled with the --enable-kbind (Kerberos KBIND) option, allows remote attackers to execute arbitrary code via an LDAP bind request using the LDAP_AUTH_KRBV41 authentication method and long credential data." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-12-16T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20061212 OpenLDAP kbind authentication buffer overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/454181/30/0/threaded" }, { "name": "2023", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2023" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.phreedom.org/solar/exploits/openldap-kbind" }, { "name": "23334", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23334" }, { "name": "ADV-2006-4964", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4964" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-6493", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the krbv4_ldap_auth function in servers/slapd/kerberos.c in OpenLDAP 2.4.3 and earlier, when OpenLDAP is compiled with the --enable-kbind (Kerberos KBIND) option, allows remote attackers to execute arbitrary code via an LDAP bind request using the LDAP_AUTH_KRBV41 authentication method and long credential data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20061212 OpenLDAP kbind authentication buffer overflow", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/454181/30/0/threaded" }, { "name": "2023", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2023" }, { "name": "http://www.phreedom.org/solar/exploits/openldap-kbind", "refsource": "MISC", "url": "http://www.phreedom.org/solar/exploits/openldap-kbind" }, { "name": "23334", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23334" }, { "name": "ADV-2006-4964", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/4964" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-6493", "datePublished": "2006-12-13T00:00:00", "dateReserved": "2006-12-12T00:00:00", "dateUpdated": "2024-08-07T20:26:46.571Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-1164 (GCVE-0-2012-1164)
Vulnerability from cvelistv5
Published
2012-06-29 19:00
Modified
2024-08-06 18:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
slapd in OpenLDAP before 2.4.30 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an LDAP search query with attrsOnly set to true, which causes empty attributes to be returned.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:53:35.431Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201406-36", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "name": "49607", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49607" }, { "name": "48372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48372" }, { "name": "MDVSA-2012:130", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:130" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7143" }, { "name": "RHSA-2012:0899", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0899.html" }, { "name": "52404", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/52404" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/software/release/changes.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT210788" }, { "name": "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "name": "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Dec/26" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-06-20T00:00:00", "descriptions": [ { "lang": "en", "value": "slapd in OpenLDAP before 2.4.30 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an LDAP search query with attrsOnly set to true, which causes empty attributes to be returned." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-13T20:06:22", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "GLSA-201406-36", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "name": "49607", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49607" }, { "name": "48372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48372" }, { "name": "MDVSA-2012:130", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:130" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7143" }, { "name": "RHSA-2012:0899", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0899.html" }, { "name": "52404", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/52404" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/software/release/changes.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT210788" }, { "name": "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "name": "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Dec/26" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-1164", "datePublished": "2012-06-29T19:00:00", "dateReserved": "2012-02-14T00:00:00", "dateUpdated": "2024-08-06T18:53:35.431Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-1081 (GCVE-0-2011-1081)
Vulnerability from cvelistv5
Published
2011-03-20 01:00
Modified
2024-08-06 22:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
modrdn.c in slapd in OpenLDAP 2.4.x before 2.4.24 allows remote attackers to cause a denial of service (daemon crash) via a relative Distinguished Name (DN) modification request (aka MODRDN operation) that contains an empty value for the OldDN field.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:14:27.830Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201406-36", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "name": "openldap-modrdnc-dos(66239)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66239" }, { "name": "[oss-security] 20110301 Re: CVE Request -- OpenLDAP -- two issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/03/01/15" }, { "name": "[oss-security] 20110301 Re: CVE Request -- OpenLDAP -- two issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/03/01/11" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6768" }, { "name": "[openldap-announce] 20110212 OpenLDAP 2.4.24 available", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openldap.org/lists/openldap-announce/201102/msg00000.html" }, { "name": "MDVSA-2011:056", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:056" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=674985" }, { "name": "RHSA-2011:0347", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0347.html" }, { "name": "[oss-security] 20110228 Re: CVE Request -- OpenLDAP -- two issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/02/28/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "MDVSA-2011:055", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:055" }, { "name": "[oss-security] 20110228 Re: CVE Request -- OpenLDAP -- two issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/02/28/2" }, { "name": "43718", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43718" }, { "name": "USN-1100-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1100-1" }, { "name": "1025191", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1025191" }, { "name": "ADV-2011-0665", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0665" }, { "name": "43331", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43331" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680975" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/modrdn.c.diff?r1=1.170.2.8\u0026r2=1.170.2.9" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-12T00:00:00", "descriptions": [ { "lang": "en", "value": "modrdn.c in slapd in OpenLDAP 2.4.x before 2.4.24 allows remote attackers to cause a denial of service (daemon crash) via a relative Distinguished Name (DN) modification request (aka MODRDN operation) that contains an empty value for the OldDN field." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "GLSA-201406-36", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "name": "openldap-modrdnc-dos(66239)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66239" }, { "name": "[oss-security] 20110301 Re: CVE Request -- OpenLDAP -- two issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/03/01/15" }, { "name": "[oss-security] 20110301 Re: CVE Request -- OpenLDAP -- two issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/03/01/11" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6768" }, { "name": "[openldap-announce] 20110212 OpenLDAP 2.4.24 available", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openldap.org/lists/openldap-announce/201102/msg00000.html" }, { "name": "MDVSA-2011:056", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:056" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=674985" }, { "name": "RHSA-2011:0347", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0347.html" }, { "name": "[oss-security] 20110228 Re: CVE Request -- OpenLDAP -- two issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/02/28/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "MDVSA-2011:055", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:055" }, { "name": "[oss-security] 20110228 Re: CVE Request -- OpenLDAP -- two issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/02/28/2" }, { "name": "43718", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43718" }, { "name": "USN-1100-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1100-1" }, { "name": "1025191", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1025191" }, { "name": "ADV-2011-0665", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0665" }, { "name": "43331", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43331" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680975" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/modrdn.c.diff?r1=1.170.2.8\u0026r2=1.170.2.9" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1081", "datePublished": "2011-03-20T01:00:00", "dateReserved": "2011-02-24T00:00:00", "dateUpdated": "2024-08-06T22:14:27.830Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-13565 (GCVE-0-2019-13565)
Vulnerability from cvelistv5
Published
2019-07-26 12:30
Modified
2024-08-04 23:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:57:39.435Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-4078-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4078-1/" }, { "name": "[debian-lts-announce] 20190818 [SECURITY] [DLA 1891-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00024.html" }, { "name": "USN-4078-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4078-2/" }, { "name": "openSUSE-SU-2019:2157", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html" }, { "name": "openSUSE-SU-2019:2176", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html" }, { "name": "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "name": "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Dec/26" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "name": "[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT210788" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.openldap.org/lists/openldap-announce/201907/msg00001.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.openldap.org/its/index.cgi/?findid=9052" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K98008862?utm_source=f5support\u0026amp%3Butm_medium=RSS" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T23:20:10", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-4078-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4078-1/" }, { "name": "[debian-lts-announce] 20190818 [SECURITY] [DLA 1891-1] openldap security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00024.html" }, { "name": "USN-4078-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4078-2/" }, { "name": "openSUSE-SU-2019:2157", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html" }, { "name": "openSUSE-SU-2019:2176", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html" }, { "name": "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "name": "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Dec/26" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "name": "[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT210788" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.openldap.org/lists/openldap-announce/201907/msg00001.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.openldap.org/its/index.cgi/?findid=9052" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K98008862?utm_source=f5support\u0026amp%3Butm_medium=RSS" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-13565", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-4078-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4078-1/" }, { "name": "[debian-lts-announce] 20190818 [SECURITY] [DLA 1891-1] openldap security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00024.html" }, { "name": "USN-4078-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4078-2/" }, { "name": "openSUSE-SU-2019:2157", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html" }, { "name": "openSUSE-SU-2019:2176", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html" }, { "name": "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "name": "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Dec/26" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "name": "[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "https://support.apple.com/kb/HT210788", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT210788" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "name": "https://www.openldap.org/lists/openldap-announce/201907/msg00001.html", "refsource": "CONFIRM", "url": "https://www.openldap.org/lists/openldap-announce/201907/msg00001.html" }, { "name": "https://www.openldap.org/its/index.cgi/?findid=9052", "refsource": "MISC", "url": "https://www.openldap.org/its/index.cgi/?findid=9052" }, { "name": "https://support.f5.com/csp/article/K98008862?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K98008862?utm_source=f5support\u0026amp;utm_medium=RSS" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-13565", "datePublished": "2019-07-26T12:30:58", "dateReserved": "2019-07-11T00:00:00", "dateUpdated": "2024-08-04T23:57:39.435Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2000-10-20 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
OpenLDAP 1.2.11 and earlier improperly installs the ud binary with group write permissions, which could allow any user in that group to replace the binary with a Trojan horse.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.neohapsis.com/archives/bugtraq/2000-07/0375.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/1511 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/bugtraq/2000-07/0375.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/1511 | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "AC07AD0D-5DF9-41A4-8592-CEFF1842355D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "30017C56-42A9-4AF9-B5B3-7357E424F837", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "C8A51F38-3F5A-4F6D-93EE-776B5C2FF48F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "8DBEC27E-3220-42CE-B6CC-675F387CB506", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "E641DFFB-CBAF-4DCF-944F-443CFF836A53", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenLDAP 1.2.11 and earlier improperly installs the ud binary with group write permissions, which could allow any user in that group to replace the binary with a Trojan horse." } ], "id": "CVE-2000-0748", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-10-20T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0375.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1511" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0375.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1511" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-02-14 03:15
Modified
2024-11-21 05:57
Severity ?
Summary
In OpenLDAP through 2.4.57 and 2.5.x through 2.5.1alpha, an assertion failure in slapd can occur in the issuerAndThisUpdateCheck function via a crafted packet, resulting in a denial of service (daemon exit) via a short timestamp. This is related to schema_init.c and checkTime.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://bugs.openldap.org/show_bug.cgi?id=9454 | Exploit, Issue Tracking, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0 | Patch, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/commit/9badb73425a67768c09bcaed1a9c26c684af6c30 | Patch, Vendor Advisory | |
cve@mitre.org | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2021/02/msg00035.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20210319-0005/ | Third Party Advisory | |
cve@mitre.org | https://www.debian.org/security/2021/dsa-4860 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.openldap.org/show_bug.cgi?id=9454 | Exploit, Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/commit/9badb73425a67768c09bcaed1a9c26c684af6c30 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/02/msg00035.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20210319-0005/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2021/dsa-4860 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
openldap | openldap | 2.5.0 | |
openldap | openldap | 2.5.1 | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "516467D7-7498-4C65-B2C3-C36F5591749E", "versionEndIncluding": "2.4.57", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.5.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "40E051DB-A915-45D6-AB96-149FC5FFAF7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.5.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "B5FC4896-931B-4B04-9401-7A85F3F0CE8C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In OpenLDAP through 2.4.57 and 2.5.x through 2.5.1alpha, an assertion failure in slapd can occur in the issuerAndThisUpdateCheck function via a crafted packet, resulting in a denial of service (daemon exit) via a short timestamp. This is related to schema_init.c and checkTime." }, { "lang": "es", "value": "En OpenLDAP versiones hasta 2.4.57 y versiones 2.5.x hasta 2.5.1alpha, puede ocurrir un fallo de aserci\u00f3n en slapd en la funci\u00f3n issuerAndThisUpdateCheck por medio de un paquete dise\u00f1ado, resultando en una denegaci\u00f3n de servicio (salida del demonio) por medio de una marca de tiempo corta.\u0026#xa0;Esto est\u00e1 relacionado con el archivo schema_init.c y checkTime" } ], "id": "CVE-2021-27212", "lastModified": "2024-11-21T05:57:36.240", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-14T03:15:12.957", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9454" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/9badb73425a67768c09bcaed1a9c26c684af6c30" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00035.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210319-0005/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4860" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9454" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/9badb73425a67768c09bcaed1a9c26c684af6c30" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00035.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210319-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4860" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-617" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-12-21 02:03
Modified
2025-04-03 01:03
Severity ?
Summary
Untrusted search path vulnerability in OpenLDAP before 2.2.28-r3 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/18040/ | Vendor Advisory | |
cve@mitre.org | http://www.gentoo.org/security/en/glsa/glsa-200512-07.xml | Patch | |
cve@mitre.org | http://www.securityfocus.com/bid/15120 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/18040/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.gentoo.org/security/en/glsa/glsa-200512-07.xml | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/15120 | Patch |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
openldap | openldap | 2.0.0 | |
openldap | openldap | 2.0.1 | |
openldap | openldap | 2.0.2 | |
openldap | openldap | 2.0.3 | |
openldap | openldap | 2.0.4 | |
openldap | openldap | 2.0.5 | |
openldap | openldap | 2.0.6 | |
openldap | openldap | 2.0.7 | |
openldap | openldap | 2.0.8 | |
openldap | openldap | 2.0.9 | |
openldap | openldap | 2.0.10 | |
openldap | openldap | 2.0.11 | |
openldap | openldap | 2.0.12 | |
openldap | openldap | 2.0.13 | |
openldap | openldap | 2.0.14 | |
openldap | openldap | 2.0.15 | |
openldap | openldap | 2.0.16 | |
openldap | openldap | 2.0.17 | |
openldap | openldap | 2.0.18 | |
openldap | openldap | 2.0.19 | |
openldap | openldap | 2.0.20 | |
openldap | openldap | 2.0.21 | |
openldap | openldap | 2.0.22 | |
openldap | openldap | 2.0.23 | |
openldap | openldap | 2.0.24 | |
openldap | openldap | 2.0.25 | |
openldap | openldap | 2.0.26 | |
openldap | openldap | 2.0.27 | |
openldap | openldap | 2.1.2 | |
openldap | openldap | 2.1.3 | |
openldap | openldap | 2.1.4 | |
openldap | openldap | 2.1.5 | |
openldap | openldap | 2.1.6 | |
openldap | openldap | 2.1.7 | |
openldap | openldap | 2.1.8 | |
openldap | openldap | 2.1.9 | |
openldap | openldap | 2.1.10 | |
openldap | openldap | 2.1.11 | |
openldap | openldap | 2.1.12 | |
openldap | openldap | 2.1.13 | |
openldap | openldap | 2.1.14 | |
openldap | openldap | 2.1.15 | |
openldap | openldap | 2.1.16 | |
openldap | openldap | 2.1.17 | |
openldap | openldap | 2.1.18 | |
openldap | openldap | 2.1.19 | |
openldap | openldap | 2.1.20 | |
openldap | openldap | 2.1.21 | |
openldap | openldap | 2.1.22 | |
openldap | openldap | 2.1.23 | |
openldap | openldap | 2.1.24 | |
openldap | openldap | 2.1.25 | |
openldap | openldap | 2.1.26 | |
openldap | openldap | 2.1.27 | |
openldap | openldap | 2.1.28 | |
openldap | openldap | 2.1.29 | |
openldap | openldap | 2.1.30 | |
openldap | openldap | 2.2.4 | |
openldap | openldap | 2.2.5 | |
openldap | openldap | 2.2.6 | |
openldap | openldap | 2.2.7 | |
openldap | openldap | 2.2.8 | |
openldap | openldap | 2.2.9 | |
openldap | openldap | 2.2.10 | |
openldap | openldap | 2.2.11 | |
openldap | openldap | 2.2.12 | |
openldap | openldap | 2.2.13 | |
openldap | openldap | 2.2.14 | |
openldap | openldap | 2.2.15 | |
openldap | openldap | 2.2.16 | |
openldap | openldap | 2.2.17 | |
openldap | openldap | 2.2.18 | |
openldap | openldap | 2.2.19 | |
openldap | openldap | 2.2.20 | |
openldap | openldap | 2.2.21 | |
openldap | openldap | 2.2.22 | |
openldap | openldap | 2.2.23 | |
openldap | openldap | 2.2.24 | |
openldap | openldap | 2.2.25 | |
openldap | openldap | 2.2.26 | |
openldap | openldap | 2.2.27 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "09146840-8A3C-4686-B8F8-2592EA9C5989", "versionEndIncluding": "2.2.28_r2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "149EBFB7-B58F-4557-8E46-6DF88BB5E57E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "03D75A36-41C4-464F-8DC4-42C841ABC087", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C3EE919-D05C-4625-85FE-132F6F2B932C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "20D99A58-8D7E-4586-A9BF-1DD2A1DBB8D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DEBA0118-545E-4D7B-B819-34D157B2BA6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "67826609-F4CA-42CB-A5D0-B4503DDE2C92", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "61676BBD-95B8-44C9-BD66-79F00381BF86", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "719A9B1D-8E32-461F-BCD4-F72C6AD3E63E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "BFD73969-39F8-4849-AF6A-15ACDC2E4537", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DB8C1DD2-865A-4CF2-8137-3C40C01C9EAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "EE38B045-2224-43D1-8618-0885505865C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "5D26DAC5-EDBD-42D8-A877-1E6EA666D72B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67B0A2B6-C560-4AE0-BC79-3C7BC9163EE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "566406CE-368A-4799-A112-E5DFC5B333D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "E5CCC734-C15B-4D2B-BF83-F214F807C44E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "64796893-A90D-4B7D-BDBC-0087B57AF7E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "39914C6A-F4DB-43CC-B2B6-097365E55D34", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "5BFDD8F7-AAFD-453F-99A4-F9C0424EA791", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "0BFEEAA6-0B50-4644-A183-F5FEE7BD7EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "920FC1DB-95E2-4367-BF20-77D75BD7617D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "28E643F8-005A-4170-8275-8E4AB5C25209", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "C8A34C63-C17D-4026-B409-AA9A56529B87", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "4EA863B0-A6AB-44BD-84E8-B6C885EFFE10", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "24BFAEC7-6256-4B8F-83F5-60FBD1571936", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "83227371-ACC3-4217-BFF9-0A3AAADD50DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "734B8101-BEAC-40AB-81EA-2516CA20BC93", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "F0BD5253-FBC9-4384-8FC3-4E384582BE91", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "AA73658A-8834-4EC2-8D8F-3A7D1C834669", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "06BCE98E-546C-4852-BAE2-CF525A778B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "94284C78-255E-43B7-A33E-FBC25BABEA2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "4B298BAA-5584-4193-A3DB-31FBB0BD12B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "90604A40-A1F5-4F23-9B8C-472E8C794B59", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "1418EC80-2F42-4C1B-BA38-CA5BDEF83F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "9BC65FE9-348D-4468-A1EF-2AC5C673DB07", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "B3A400A0-B9D7-4CB2-82EA-49A599C2B30B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "65587514-46AB-4D70-B7C2-FBED7F78D13D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "7951BAAB-CB06-4F19-891A-E07E2B3C8701", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "82EC30A1-4150-44DC-89F7-5A64B8CC4A84", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "9DF04D97-A561-427B-9891-A1423B86F164", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "1E74B0C8-2D64-4BF2-B152-87909E3029EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "88F6CA0B-ED91-4085-8EE0-1F4256747621", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "B90657E7-D651-4E1E-8035-13A1F024E3C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "7BBE5477-BE27-412A-9BA9-9690F746B4F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "31300FA3-C57D-4564-927E-B06C0229BE8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "342E414D-8ED6-4E5A-88F0-57B5846A3EB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7C0BD0FD-BD80-4197-8479-BBB070DAB890", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "FC9CA4EF-61F1-407B-B2BF-B4AFD68F50BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "EB80C814-5B28-46CC-8237-70A558BF049C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "832AC063-6004-4A78-A964-45906361F9C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "E7C40DFD-4FB8-40AA-ABA4-194DED1241A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "992733F2-000F-4E27-8D19-AF18543E57BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "B36E0E49-D908-4A19-A621-6E7FB3E59A18", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "74779CA2-6741-4053-8C23-98A1F938B264", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "930DAA18-113F-42B0-8382-8579575D238F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "98F50353-EBFB-4DE5-8D35-80C672A12E41", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "18A4F43F-8E4F-4203-B640-02BBB28052A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "28063C54-EE5E-44EC-8D47-E880C2BB45BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "0F611094-500A-4306-8C15-4878135FA45D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "32096DE5-3F2C-4FF7-BDC6-E316DFDC97A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FE197F27-CB34-4B0E-A30A-C9C87295AAD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "10A4256F-EC89-425F-86FD-B0DE243EBF2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "4A34127E-507D-4F72-9F93-B23F91DB0F53", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "B7A2D5D9-3E7E-4420-A338-B05A8C077229", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "C76EF100-3328-4C70-A123-50A4ECFF539E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "1DCE7803-E652-4A17-8EEB-B91C81CF48E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "DA5CB439-5F0B-40CF-8564-6875CAC74FCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB5E524E-1B71-46B5-A14E-C2342851C0FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "FE103338-9AE7-4230-A8B2-09273004B4D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "12621DED-ABF1-47A7-961C-E6DE1F6302AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "C8026929-4845-46E4-A6F8-E60CA498201B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "DE01BD68-D6DC-4220-A3F0-71961CEA205F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "68DE3F16-E171-4FA3-9B00-3F944A4E7604", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "63F7B718-0E5C-4900-A5DE-D59D37EC79D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "8B8805A0-F543-450D-82E9-EE923904E2A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.21:*:*:*:*:*:*:*", "matchCriteriaId": "58779045-578C-41D5-9CAE-D6F48C91654C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "969F18EF-067A-47BA-9DC4-9FA69D9DCBB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.23:*:*:*:*:*:*:*", "matchCriteriaId": "E12766AB-2AFE-4BBD-8B80-8BEA932ABDFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.24:*:*:*:*:*:*:*", "matchCriteriaId": "6C2C7514-8BB4-4B8A-A5AF-D4A26B232597", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.25:*:*:*:*:*:*:*", "matchCriteriaId": "64C0AB94-ED91-4218-8F97-862BA57D1CC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.26:*:*:*:*:*:*:*", "matchCriteriaId": "E2FF5C05-0A64-416C-8346-EE5FF4AA14F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.27:*:*:*:*:*:*:*", "matchCriteriaId": "5C081128-2846-4257-B822-10AADE54899D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in OpenLDAP before 2.2.28-r3 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH." } ], "id": "CVE-2005-4442", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-12-21T02:03:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/18040/" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-07.xml" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/15120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/18040/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-07.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/15120" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "This issue did not affect the versions of OpenLDAP as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.", "lastModified": "2006-08-30T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-10-30 19:46
Modified
2025-04-09 00:30
Severity ?
Summary
slapo-pcache (overlays/pcache.c) in slapd in OpenLDAP before 2.3.39, when running as a proxy-caching server, allocates memory using a malloc variant instead of calloc, which prevents an array from being initialized properly and might allow attackers to cause a denial of service (segmentation fault) via unknown vectors that prevent the array from being null terminated.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://secunia.com/advisories/27424 | Patch, Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/27683 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/27756 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/27868 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/29225 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/29461 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/29682 | Vendor Advisory | |
secalert@redhat.com | http://security.gentoo.org/glsa/glsa-200803-28.xml | ||
secalert@redhat.com | http://www.debian.org/security/2008/dsa-1541 | ||
secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2008:058 | ||
secalert@redhat.com | http://www.novell.com/linux/security/advisories/2007_24_sr.html | ||
secalert@redhat.com | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5163 | ||
secalert@redhat.com | http://www.openldap.org/lists/openldap-announce/200710/msg00001.html | Patch | |
secalert@redhat.com | http://www.redhat.com/archives/fedora-package-announce/2007-November/msg00460.html | ||
secalert@redhat.com | http://www.securityfocus.com/bid/26245 | ||
secalert@redhat.com | http://www.ubuntu.com/usn/usn-551-1 | ||
secalert@redhat.com | http://www.vupen.com/english/advisories/2007/3645 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27424 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27683 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27756 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27868 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29225 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29461 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29682 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200803-28.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2008/dsa-1541 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2008:058 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/linux/security/advisories/2007_24_sr.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5163 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/lists/openldap-announce/200710/msg00001.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/archives/fedora-package-announce/2007-November/msg00460.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/26245 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-551-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/3645 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | 1.0 | |
openldap | openldap | 1.0.1 | |
openldap | openldap | 1.0.2 | |
openldap | openldap | 1.0.3 | |
openldap | openldap | 1.1 | |
openldap | openldap | 1.1.0 | |
openldap | openldap | 1.1.1 | |
openldap | openldap | 1.1.2 | |
openldap | openldap | 1.1.3 | |
openldap | openldap | 1.1.4 | |
openldap | openldap | 1.2 | |
openldap | openldap | 1.2.0 | |
openldap | openldap | 1.2.1 | |
openldap | openldap | 1.2.2 | |
openldap | openldap | 1.2.3 | |
openldap | openldap | 1.2.4 | |
openldap | openldap | 1.2.5 | |
openldap | openldap | 1.2.6 | |
openldap | openldap | 1.2.7 | |
openldap | openldap | 1.2.8 | |
openldap | openldap | 1.2.9 | |
openldap | openldap | 1.2.10 | |
openldap | openldap | 1.2.11 | |
openldap | openldap | 1.2.12 | |
openldap | openldap | 1.2.13 | |
openldap | openldap | 2.0 | |
openldap | openldap | 2.0.0 | |
openldap | openldap | 2.0.1 | |
openldap | openldap | 2.0.2 | |
openldap | openldap | 2.0.3 | |
openldap | openldap | 2.0.4 | |
openldap | openldap | 2.0.5 | |
openldap | openldap | 2.0.6 | |
openldap | openldap | 2.0.7 | |
openldap | openldap | 2.0.8 | |
openldap | openldap | 2.0.9 | |
openldap | openldap | 2.0.10 | |
openldap | openldap | 2.0.11 | |
openldap | openldap | 2.0.11_9 | |
openldap | openldap | 2.0.11_11 | |
openldap | openldap | 2.0.11_11s | |
openldap | openldap | 2.0.12 | |
openldap | openldap | 2.0.13 | |
openldap | openldap | 2.0.14 | |
openldap | openldap | 2.0.15 | |
openldap | openldap | 2.0.16 | |
openldap | openldap | 2.0.17 | |
openldap | openldap | 2.0.18 | |
openldap | openldap | 2.0.19 | |
openldap | openldap | 2.0.20 | |
openldap | openldap | 2.0.21 | |
openldap | openldap | 2.0.22 | |
openldap | openldap | 2.0.23 | |
openldap | openldap | 2.0.24 | |
openldap | openldap | 2.0.25 | |
openldap | openldap | 2.0.26 | |
openldap | openldap | 2.0.27 | |
openldap | openldap | 2.1.2 | |
openldap | openldap | 2.1.3 | |
openldap | openldap | 2.1.4 | |
openldap | openldap | 2.1.5 | |
openldap | openldap | 2.1.6 | |
openldap | openldap | 2.1.7 | |
openldap | openldap | 2.1.8 | |
openldap | openldap | 2.1.9 | |
openldap | openldap | 2.1.10 | |
openldap | openldap | 2.1.11 | |
openldap | openldap | 2.1.12 | |
openldap | openldap | 2.1.13 | |
openldap | openldap | 2.1.14 | |
openldap | openldap | 2.1.15 | |
openldap | openldap | 2.1.16 | |
openldap | openldap | 2.1.17 | |
openldap | openldap | 2.1.18 | |
openldap | openldap | 2.1.19 | |
openldap | openldap | 2.1.20 | |
openldap | openldap | 2.1.21 | |
openldap | openldap | 2.1.22 | |
openldap | openldap | 2.1.23 | |
openldap | openldap | 2.1.24 | |
openldap | openldap | 2.1.25 | |
openldap | openldap | 2.1.26 | |
openldap | openldap | 2.1.27 | |
openldap | openldap | 2.1.28 | |
openldap | openldap | 2.1.29 | |
openldap | openldap | 2.1.30 | |
openldap | openldap | 2.1_.20 | |
openldap | openldap | 2.2.0 | |
openldap | openldap | 2.2.1 | |
openldap | openldap | 2.2.4 | |
openldap | openldap | 2.2.5 | |
openldap | openldap | 2.2.6 | |
openldap | openldap | 2.2.7 | |
openldap | openldap | 2.2.8 | |
openldap | openldap | 2.2.9 | |
openldap | openldap | 2.2.10 | |
openldap | openldap | 2.2.11 | |
openldap | openldap | 2.2.12 | |
openldap | openldap | 2.2.13 | |
openldap | openldap | 2.2.14 | |
openldap | openldap | 2.2.15 | |
openldap | openldap | 2.2.16 | |
openldap | openldap | 2.2.17 | |
openldap | openldap | 2.2.18 | |
openldap | openldap | 2.2.19 | |
openldap | openldap | 2.2.20 | |
openldap | openldap | 2.2.21 | |
openldap | openldap | 2.2.22 | |
openldap | openldap | 2.2.23 | |
openldap | openldap | 2.2.24 | |
openldap | openldap | 2.2.25 | |
openldap | openldap | 2.2.26 | |
openldap | openldap | 2.2.27 | |
openldap | openldap | 2.2.28_r2 | |
openldap | openldap | 2.2.29_rev_1.134 | |
openldap | openldap | 2.3.27_2.20061018 | |
openldap | openldap | 2.3.28_2.20061022 | |
openldap | openldap | 2.3.28_20061022 | |
openldap | openldap | 2.3.28_e1.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "086DC60F-F530-4515-8F3D-87F30DB9B322", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D538927-82D5-476E-9C85-2E9297316D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "2A904832-A6D6-45D4-B07C-79ED1FE47A80", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BB554A4-EEC2-4E17-9F32-27A580B9E389", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "191DB249-6A73-4561-8CCA-565D1525CB31", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "423F9D3A-6AA7-4D64-B872-2C867EEFC3DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "34A5D9A5-FB1D-4ACF-846A-4DB73196122C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "41400CE6-FA51-435C-93F7-B31FE42F18AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "6022ABEB-6825-4A5F-9884-74F94C2387F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "D2F15789-334D-460D-B5B3-FCC71087D107", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F77B1548-BB6D-4618-AE7B-E97F91A0AF5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1CC52235-72DA-4EF4-870A-AF25181DB56C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "B7064C52-1211-42B8-BF1F-C22D800AED07", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1CD95826-E44A-48C6-BAAB-77A905CAE6B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "FEEA6BB6-41FC-4F15-A95F-9B052F062454", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "E90766C1-6DBD-435C-85E1-920DAFA26D67", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "8CD13DAE-9588-4540-9183-FB80C507F985", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "526366F3-52F0-4816-A356-8F39B718C048", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "AC07AD0D-5DF9-41A4-8592-CEFF1842355D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "30017C56-42A9-4AF9-B5B3-7357E424F837", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "C8A51F38-3F5A-4F6D-93EE-776B5C2FF48F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "8DBEC27E-3220-42CE-B6CC-675F387CB506", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "E641DFFB-CBAF-4DCF-944F-443CFF836A53", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "A552E270-5C9C-40DC-B23D-97C8D995B8FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "53DF812C-E1F8-46D3-A072-3FBE696ADC33", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "552F2E25-DDB8-49A6-844A-8520696DBE5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "149EBFB7-B58F-4557-8E46-6DF88BB5E57E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "03D75A36-41C4-464F-8DC4-42C841ABC087", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C3EE919-D05C-4625-85FE-132F6F2B932C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "20D99A58-8D7E-4586-A9BF-1DD2A1DBB8D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DEBA0118-545E-4D7B-B819-34D157B2BA6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "67826609-F4CA-42CB-A5D0-B4503DDE2C92", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "61676BBD-95B8-44C9-BD66-79F00381BF86", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "719A9B1D-8E32-461F-BCD4-F72C6AD3E63E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "BFD73969-39F8-4849-AF6A-15ACDC2E4537", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DB8C1DD2-865A-4CF2-8137-3C40C01C9EAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "EE38B045-2224-43D1-8618-0885505865C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "5D26DAC5-EDBD-42D8-A877-1E6EA666D72B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.11_9:*:*:*:*:*:*:*", "matchCriteriaId": "E7AE325E-514C-40A1-AA56-D605377B5D90", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.11_11:*:*:*:*:*:*:*", "matchCriteriaId": "19397A11-E549-4F31-8007-8D5F3C0AABB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.11_11s:*:*:*:*:*:*:*", "matchCriteriaId": "1C659213-271D-4F22-AE14-A1646A612D2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67B0A2B6-C560-4AE0-BC79-3C7BC9163EE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "566406CE-368A-4799-A112-E5DFC5B333D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "E5CCC734-C15B-4D2B-BF83-F214F807C44E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "64796893-A90D-4B7D-BDBC-0087B57AF7E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "39914C6A-F4DB-43CC-B2B6-097365E55D34", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "5BFDD8F7-AAFD-453F-99A4-F9C0424EA791", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "0BFEEAA6-0B50-4644-A183-F5FEE7BD7EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "920FC1DB-95E2-4367-BF20-77D75BD7617D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "28E643F8-005A-4170-8275-8E4AB5C25209", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "C8A34C63-C17D-4026-B409-AA9A56529B87", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "4EA863B0-A6AB-44BD-84E8-B6C885EFFE10", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "24BFAEC7-6256-4B8F-83F5-60FBD1571936", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "83227371-ACC3-4217-BFF9-0A3AAADD50DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "734B8101-BEAC-40AB-81EA-2516CA20BC93", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "F0BD5253-FBC9-4384-8FC3-4E384582BE91", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "AA73658A-8834-4EC2-8D8F-3A7D1C834669", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "06BCE98E-546C-4852-BAE2-CF525A778B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "94284C78-255E-43B7-A33E-FBC25BABEA2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "4B298BAA-5584-4193-A3DB-31FBB0BD12B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "90604A40-A1F5-4F23-9B8C-472E8C794B59", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "1418EC80-2F42-4C1B-BA38-CA5BDEF83F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "9BC65FE9-348D-4468-A1EF-2AC5C673DB07", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "B3A400A0-B9D7-4CB2-82EA-49A599C2B30B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "65587514-46AB-4D70-B7C2-FBED7F78D13D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "7951BAAB-CB06-4F19-891A-E07E2B3C8701", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "82EC30A1-4150-44DC-89F7-5A64B8CC4A84", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "9DF04D97-A561-427B-9891-A1423B86F164", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "1E74B0C8-2D64-4BF2-B152-87909E3029EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "88F6CA0B-ED91-4085-8EE0-1F4256747621", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "B90657E7-D651-4E1E-8035-13A1F024E3C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "7BBE5477-BE27-412A-9BA9-9690F746B4F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "31300FA3-C57D-4564-927E-B06C0229BE8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "342E414D-8ED6-4E5A-88F0-57B5846A3EB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7C0BD0FD-BD80-4197-8479-BBB070DAB890", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "FC9CA4EF-61F1-407B-B2BF-B4AFD68F50BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "EB80C814-5B28-46CC-8237-70A558BF049C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "832AC063-6004-4A78-A964-45906361F9C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "E7C40DFD-4FB8-40AA-ABA4-194DED1241A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "992733F2-000F-4E27-8D19-AF18543E57BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "B36E0E49-D908-4A19-A621-6E7FB3E59A18", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "74779CA2-6741-4053-8C23-98A1F938B264", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "930DAA18-113F-42B0-8382-8579575D238F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "98F50353-EBFB-4DE5-8D35-80C672A12E41", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "18A4F43F-8E4F-4203-B640-02BBB28052A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "28063C54-EE5E-44EC-8D47-E880C2BB45BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1_.20:*:*:*:*:*:*:*", "matchCriteriaId": "E8BCFC49-6505-4713-A06C-A64782A34414", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BAE01BA8-416B-4419-99E5-81C1FA404FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C2F45B8-B9FB-4D43-B2DD-98413F5F2B85", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "0F611094-500A-4306-8C15-4878135FA45D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "32096DE5-3F2C-4FF7-BDC6-E316DFDC97A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FE197F27-CB34-4B0E-A30A-C9C87295AAD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "10A4256F-EC89-425F-86FD-B0DE243EBF2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "4A34127E-507D-4F72-9F93-B23F91DB0F53", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "B7A2D5D9-3E7E-4420-A338-B05A8C077229", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "C76EF100-3328-4C70-A123-50A4ECFF539E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "1DCE7803-E652-4A17-8EEB-B91C81CF48E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "DA5CB439-5F0B-40CF-8564-6875CAC74FCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB5E524E-1B71-46B5-A14E-C2342851C0FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "FE103338-9AE7-4230-A8B2-09273004B4D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "12621DED-ABF1-47A7-961C-E6DE1F6302AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "C8026929-4845-46E4-A6F8-E60CA498201B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "DE01BD68-D6DC-4220-A3F0-71961CEA205F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "68DE3F16-E171-4FA3-9B00-3F944A4E7604", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "63F7B718-0E5C-4900-A5DE-D59D37EC79D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "8B8805A0-F543-450D-82E9-EE923904E2A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.21:*:*:*:*:*:*:*", "matchCriteriaId": "58779045-578C-41D5-9CAE-D6F48C91654C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "969F18EF-067A-47BA-9DC4-9FA69D9DCBB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.23:*:*:*:*:*:*:*", "matchCriteriaId": "E12766AB-2AFE-4BBD-8B80-8BEA932ABDFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.24:*:*:*:*:*:*:*", "matchCriteriaId": "6C2C7514-8BB4-4B8A-A5AF-D4A26B232597", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.25:*:*:*:*:*:*:*", "matchCriteriaId": "64C0AB94-ED91-4218-8F97-862BA57D1CC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.26:*:*:*:*:*:*:*", "matchCriteriaId": "E2FF5C05-0A64-416C-8346-EE5FF4AA14F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.27:*:*:*:*:*:*:*", "matchCriteriaId": "5C081128-2846-4257-B822-10AADE54899D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.28_r2:*:*:*:*:*:*:*", "matchCriteriaId": "45FF1704-80C6-439E-B145-7F5B14B62E46", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.29_rev_1.134:*:*:*:*:*:*:*", "matchCriteriaId": "7D92C2EA-951D-485B-8653-528926E55557", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.27_2.20061018:*:*:*:*:*:*:*", "matchCriteriaId": "548AE94B-CFF5-4416-812B-B1F60C2799F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.28_2.20061022:*:*:*:*:*:*:*", "matchCriteriaId": "55399875-38F4-486B-88F2-E17F00C901CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.28_20061022:*:*:*:*:*:*:*", "matchCriteriaId": "8971D9E4-C4B7-4DFF-B20D-0520D484E692", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.28_e1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "86033CDB-D9A3-4872-9FF7-789F2332923B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "slapo-pcache (overlays/pcache.c) in slapd in OpenLDAP before 2.3.39, when running as a proxy-caching server, allocates memory using a malloc variant instead of calloc, which prevents an array from being initialized properly and might allow attackers to cause a denial of service (segmentation fault) via unknown vectors that prevent the array from being null terminated." }, { "lang": "es", "value": "slapo-pcache (overlays/pcache.c) en slapd en OpenLDAP versiones anteriores a 2.3.39, cuando es ejecutado como un servidor de almacenamiento en cach\u00e9 de proxy, asigna memoria mediante una variante malloc en lugar de calloc, lo que impide que una matriz se inicialice apropiadamente y podr\u00eda permitir a atacantes causar una denegaci\u00f3n de servicio (fallo de segmentaci\u00f3n) por medio de vectores de ataque desconocidos que impiden que la matriz sea terminada en null." } ], "id": "CVE-2007-5708", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-10-30T19:46:00.000", "references": [ { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/27424" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27683" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27756" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27868" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29225" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29461" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29682" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-200803-28.xml" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2008/dsa-1541" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:058" }, { "source": "secalert@redhat.com", "url": "http://www.novell.com/linux/security/advisories/2007_24_sr.html" }, { "source": "secalert@redhat.com", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5163" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.openldap.org/lists/openldap-announce/200710/msg00001.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/archives/fedora-package-announce/2007-November/msg00460.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/26245" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/usn-551-1" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/3645" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/27424" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27683" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27756" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27868" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29225" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29461" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29682" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200803-28.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2008/dsa-1541" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:058" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2007_24_sr.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5163" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openldap.org/lists/openldap-announce/200710/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/archives/fedora-package-announce/2007-November/msg00460.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/26245" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-551-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/3645" } ], "sourceIdentifier": "secalert@redhat.com", "vendorComments": [ { "comment": "Not vulnerable. This issue did not affect the versions of OpenLDAP as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.", "lastModified": "2007-11-01T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-02-13 21:00
Modified
2025-04-09 00:30
Severity ?
Summary
slapd/back-bdb/modrdn.c in the BDB backend for slapd in OpenLDAP 2.3.39 allows remote authenticated users to cause a denial of service (daemon crash) via a modrdn operation with a NOOP (LDAP_X_NO_OPERATION) control, a related issue to CVE-2007-6698.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html | ||
secalert@redhat.com | http://secunia.com/advisories/28914 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/28926 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/28953 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/29068 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/29225 | ||
secalert@redhat.com | http://secunia.com/advisories/29256 | ||
secalert@redhat.com | http://secunia.com/advisories/29461 | ||
secalert@redhat.com | http://secunia.com/advisories/29682 | ||
secalert@redhat.com | http://secunia.com/advisories/29957 | ||
secalert@redhat.com | http://security.gentoo.org/glsa/glsa-200803-28.xml | ||
secalert@redhat.com | http://support.apple.com/kb/HT3937 | ||
secalert@redhat.com | http://wiki.rpath.com/Advisories:rPSA-2008-0059 | ||
secalert@redhat.com | http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0059 | ||
secalert@redhat.com | http://www.debian.org/security/2008/dsa-1541 | ||
secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2008:058 | ||
secalert@redhat.com | http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-bdb/modrdn.c.diff?r1=1.197&r2=1.198&f=h | Exploit | |
secalert@redhat.com | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5358 | ||
secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2008-0110.html | ||
secalert@redhat.com | http://www.securityfocus.com/archive/1/488242/100/200/threaded | ||
secalert@redhat.com | http://www.securityfocus.com/bid/27778 | ||
secalert@redhat.com | http://www.securitytracker.com/id?1019481 | ||
secalert@redhat.com | http://www.ubuntu.com/usn/usn-584-1 | ||
secalert@redhat.com | http://www.vupen.com/english/advisories/2008/0536/references | ||
secalert@redhat.com | http://www.vupen.com/english/advisories/2009/3184 | ||
secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/40479 | ||
secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9470 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28914 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28926 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28953 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29068 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29225 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29256 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29461 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29682 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29957 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200803-28.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT3937 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://wiki.rpath.com/Advisories:rPSA-2008-0059 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0059 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2008/dsa-1541 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2008:058 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-bdb/modrdn.c.diff?r1=1.197&r2=1.198&f=h | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5358 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0110.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/488242/100/200/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/27778 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1019481 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-584-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/0536/references | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/3184 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/40479 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9470 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:2.3.39:*:*:*:*:*:*:*", "matchCriteriaId": "1F11D98D-F23D-45B4-9733-B3C0C781ADCC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "slapd/back-bdb/modrdn.c in the BDB backend for slapd in OpenLDAP 2.3.39 allows remote authenticated users to cause a denial of service (daemon crash) via a modrdn operation with a NOOP (LDAP_X_NO_OPERATION) control, a related issue to CVE-2007-6698." }, { "lang": "es", "value": "slapd/back-bdb/modrdn.c en el motor interno BDB para slapd de OpenLDAP 2.3.39. Permite a usuarios autentificados remotamente provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) a trav\u00e9s de una operaci\u00f3n modrdn con un control NOOP (LDAP_X_NO_OPERATION), un tema relacionado con CVE-2007-6698." } ], "id": "CVE-2008-0658", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-02-13T21:00:00.000", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28914" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28926" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28953" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29068" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/29225" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/29256" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/29461" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/29682" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/29957" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-200803-28.xml" }, { "source": "secalert@redhat.com", "url": "http://support.apple.com/kb/HT3937" }, { "source": "secalert@redhat.com", "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0059" }, { "source": "secalert@redhat.com", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0059" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2008/dsa-1541" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:058" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-bdb/modrdn.c.diff?r1=1.197\u0026r2=1.198\u0026f=h" }, { "source": "secalert@redhat.com", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5358" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2008-0110.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/488242/100/200/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/27778" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1019481" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/usn-584-1" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2008/0536/references" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2009/3184" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40479" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9470" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28914" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28926" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28953" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29068" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29225" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29256" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29461" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29682" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29957" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200803-28.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT3937" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0059" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0059" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2008/dsa-1541" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:058" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-bdb/modrdn.c.diff?r1=1.197\u0026r2=1.198\u0026f=h" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5358" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0110.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/488242/100/200/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/27778" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019481" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-584-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0536/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/3184" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40479" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9470" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-07-28 12:48
Modified
2025-04-11 00:51
Severity ?
Summary
OpenLDAP 2.4.22 allows remote attackers to cause a denial of service (crash) via a modrdn call with a zero-length RDN destination string, which is not properly handled by the smr_normalize function and triggers a NULL pointer dereference in the IA5StringNormalize function in schema_init.c, as demonstrated using the Codenomicon LDAPv3 test suite.
References
▶ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 | ||
cret@cert.org | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735 | ||
cret@cert.org | http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html | ||
cret@cert.org | http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html | ||
cret@cert.org | http://secunia.com/advisories/40639 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/40687 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/42787 | ||
cret@cert.org | http://security.gentoo.org/glsa/glsa-201406-36.xml | ||
cret@cert.org | http://support.apple.com/kb/HT4435 | ||
cret@cert.org | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6570 | Exploit | |
cret@cert.org | http://www.redhat.com/support/errata/RHSA-2010-0542.html | ||
cret@cert.org | http://www.securityfocus.com/archive/1/515545/100/0/threaded | ||
cret@cert.org | http://www.securityfocus.com/bid/41770 | Exploit, Patch | |
cret@cert.org | http://www.securitytracker.com/id?1024221 | ||
cret@cert.org | http://www.vmware.com/security/advisories/VMSA-2011-0001.html | ||
cret@cert.org | http://www.vupen.com/english/advisories/2010/1849 | Patch, Vendor Advisory | |
cret@cert.org | http://www.vupen.com/english/advisories/2010/1858 | Vendor Advisory | |
cret@cert.org | http://www.vupen.com/english/advisories/2011/0025 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/40639 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/40687 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42787 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201406-36.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT4435 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6570 | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2010-0542.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/515545/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/41770 | Exploit, Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024221 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2011-0001.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1849 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1858 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0025 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:2.4.22:*:*:*:*:*:*:*", "matchCriteriaId": "0FAEA812-BB47-47A3-A975-B3B8D30DBA36", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenLDAP 2.4.22 allows remote attackers to cause a denial of service (crash) via a modrdn call with a zero-length RDN destination string, which is not properly handled by the smr_normalize function and triggers a NULL pointer dereference in the IA5StringNormalize function in schema_init.c, as demonstrated using the Codenomicon LDAPv3 test suite." }, { "lang": "es", "value": "OpenLDAP 2.4.22 permite a atacantes remotos provocar una denegaci\u00f3n de servicio(ca\u00edda) a trav\u00e9s de una llamada modrdn con una cadena de destino RDN con longitud cero, que no es manejada adecuadamente por la funci\u00f3n smr_normalize y que provoca una deferencia a puntero nulo en la funci\u00f3n IA5StringNormalize en schema_init.c, como se ha demostrado usando la suite de pruebas Codenomicon LDAPv3." } ], "id": "CVE-2010-0212", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-07-28T12:48:51.683", "references": [ { "source": "cret@cert.org", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "source": "cret@cert.org", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10735" }, { "source": "cret@cert.org", "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "source": "cret@cert.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40639" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40687" }, { "source": "cret@cert.org", "url": "http://secunia.com/advisories/42787" }, { "source": "cret@cert.org", "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "source": "cret@cert.org", "url": "http://support.apple.com/kb/HT4435" }, { "source": "cret@cert.org", "tags": [ "Exploit" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6570" }, { "source": "cret@cert.org", "url": "http://www.redhat.com/support/errata/RHSA-2010-0542.html" }, { "source": "cret@cert.org", "url": "http://www.securityfocus.com/archive/1/515545/100/0/threaded" }, { "source": "cret@cert.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/41770" }, { "source": "cret@cert.org", "url": "http://www.securitytracker.com/id?1024221" }, { "source": "cret@cert.org", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0001.html" }, { "source": "cret@cert.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1849" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1858" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2011/0025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10735" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40639" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/42787" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT4435" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6570" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0542.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/515545/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/41770" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024221" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1849" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1858" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0025" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-10-27 20:55
Modified
2025-04-11 00:51
Severity ?
Summary
Off-by-one error in the UTF8StringNormalize function in OpenLDAP 2.4.26 and earlier allows remote attackers to cause a denial of service (slapd crash) via a zero-length string that triggers a heap-based buffer overflow, as demonstrated using an empty postalAddressAttribute value in an LDIF entry.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://secunia.com/advisories/46599 | Vendor Advisory | |
secalert@redhat.com | http://security.gentoo.org/glsa/glsa-201406-36.xml | ||
secalert@redhat.com | http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commitdiff%3Bh=507238713b71208ec4f262f312cb495a302df9e9 | ||
secalert@redhat.com | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7059%3Bselectid=7059 | ||
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2011/10/26/5 | ||
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2011/10/26/9 | ||
secalert@redhat.com | http://www.securityfocus.com/bid/50384 | ||
secalert@redhat.com | http://www.ubuntu.com/usn/USN-1266-1 | ||
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=749324 | Patch | |
secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/70991 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/46599 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201406-36.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commitdiff%3Bh=507238713b71208ec4f262f312cb495a302df9e9 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7059%3Bselectid=7059 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2011/10/26/5 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2011/10/26/9 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/50384 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-1266-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=749324 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/70991 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
openldap | openldap | 1.0 | |
openldap | openldap | 1.0.1 | |
openldap | openldap | 1.0.2 | |
openldap | openldap | 1.0.3 | |
openldap | openldap | 1.1 | |
openldap | openldap | 1.1.0 | |
openldap | openldap | 1.1.1 | |
openldap | openldap | 1.1.2 | |
openldap | openldap | 1.1.3 | |
openldap | openldap | 1.1.4 | |
openldap | openldap | 1.2 | |
openldap | openldap | 1.2.0 | |
openldap | openldap | 1.2.1 | |
openldap | openldap | 1.2.2 | |
openldap | openldap | 1.2.3 | |
openldap | openldap | 1.2.4 | |
openldap | openldap | 1.2.5 | |
openldap | openldap | 1.2.6 | |
openldap | openldap | 1.2.7 | |
openldap | openldap | 1.2.8 | |
openldap | openldap | 1.2.9 | |
openldap | openldap | 1.2.10 | |
openldap | openldap | 1.2.11 | |
openldap | openldap | 1.2.12 | |
openldap | openldap | 1.2.13 | |
openldap | openldap | 2.0 | |
openldap | openldap | 2.0.0 | |
openldap | openldap | 2.0.1 | |
openldap | openldap | 2.0.2 | |
openldap | openldap | 2.0.3 | |
openldap | openldap | 2.0.4 | |
openldap | openldap | 2.0.5 | |
openldap | openldap | 2.0.6 | |
openldap | openldap | 2.0.7 | |
openldap | openldap | 2.0.8 | |
openldap | openldap | 2.0.9 | |
openldap | openldap | 2.0.10 | |
openldap | openldap | 2.0.11 | |
openldap | openldap | 2.0.11_9 | |
openldap | openldap | 2.0.11_11 | |
openldap | openldap | 2.0.11_11s | |
openldap | openldap | 2.0.12 | |
openldap | openldap | 2.0.13 | |
openldap | openldap | 2.0.14 | |
openldap | openldap | 2.0.15 | |
openldap | openldap | 2.0.16 | |
openldap | openldap | 2.0.17 | |
openldap | openldap | 2.0.18 | |
openldap | openldap | 2.0.19 | |
openldap | openldap | 2.0.20 | |
openldap | openldap | 2.0.21 | |
openldap | openldap | 2.0.22 | |
openldap | openldap | 2.0.23 | |
openldap | openldap | 2.0.24 | |
openldap | openldap | 2.0.25 | |
openldap | openldap | 2.0.26 | |
openldap | openldap | 2.0.27 | |
openldap | openldap | 2.1.2 | |
openldap | openldap | 2.1.3 | |
openldap | openldap | 2.1.4 | |
openldap | openldap | 2.1.5 | |
openldap | openldap | 2.1.6 | |
openldap | openldap | 2.1.7 | |
openldap | openldap | 2.1.8 | |
openldap | openldap | 2.1.9 | |
openldap | openldap | 2.1.10 | |
openldap | openldap | 2.1.11 | |
openldap | openldap | 2.1.12 | |
openldap | openldap | 2.1.13 | |
openldap | openldap | 2.1.14 | |
openldap | openldap | 2.1.15 | |
openldap | openldap | 2.1.16 | |
openldap | openldap | 2.1.17 | |
openldap | openldap | 2.1.18 | |
openldap | openldap | 2.1.19 | |
openldap | openldap | 2.1.20 | |
openldap | openldap | 2.1.21 | |
openldap | openldap | 2.1.22 | |
openldap | openldap | 2.1.23 | |
openldap | openldap | 2.1.24 | |
openldap | openldap | 2.1.25 | |
openldap | openldap | 2.1.26 | |
openldap | openldap | 2.1.27 | |
openldap | openldap | 2.1.28 | |
openldap | openldap | 2.1.29 | |
openldap | openldap | 2.1.30 | |
openldap | openldap | 2.1_.20 | |
openldap | openldap | 2.2.0 | |
openldap | openldap | 2.2.1 | |
openldap | openldap | 2.2.4 | |
openldap | openldap | 2.2.5 | |
openldap | openldap | 2.2.6 | |
openldap | openldap | 2.2.7 | |
openldap | openldap | 2.2.8 | |
openldap | openldap | 2.2.9 | |
openldap | openldap | 2.2.10 | |
openldap | openldap | 2.2.11 | |
openldap | openldap | 2.2.12 | |
openldap | openldap | 2.2.13 | |
openldap | openldap | 2.2.14 | |
openldap | openldap | 2.2.15 | |
openldap | openldap | 2.2.16 | |
openldap | openldap | 2.2.17 | |
openldap | openldap | 2.2.18 | |
openldap | openldap | 2.2.19 | |
openldap | openldap | 2.2.20 | |
openldap | openldap | 2.2.21 | |
openldap | openldap | 2.2.22 | |
openldap | openldap | 2.2.23 | |
openldap | openldap | 2.2.24 | |
openldap | openldap | 2.2.25 | |
openldap | openldap | 2.2.26 | |
openldap | openldap | 2.2.27 | |
openldap | openldap | 2.3.4 | |
openldap | openldap | 2.3.5 | |
openldap | openldap | 2.3.6 | |
openldap | openldap | 2.3.7 | |
openldap | openldap | 2.3.8 | |
openldap | openldap | 2.3.9 | |
openldap | openldap | 2.3.10 | |
openldap | openldap | 2.3.11 | |
openldap | openldap | 2.3.12 | |
openldap | openldap | 2.3.13 | |
openldap | openldap | 2.3.14 | |
openldap | openldap | 2.3.15 | |
openldap | openldap | 2.3.16 | |
openldap | openldap | 2.3.17 | |
openldap | openldap | 2.3.18 | |
openldap | openldap | 2.3.19 | |
openldap | openldap | 2.3.20 | |
openldap | openldap | 2.3.21 | |
openldap | openldap | 2.3.22 | |
openldap | openldap | 2.3.23 | |
openldap | openldap | 2.3.24 | |
openldap | openldap | 2.3.25 | |
openldap | openldap | 2.3.26 | |
openldap | openldap | 2.3.27 | |
openldap | openldap | 2.3.28 | |
openldap | openldap | 2.3.29 | |
openldap | openldap | 2.3.30 | |
openldap | openldap | 2.3.31 | |
openldap | openldap | 2.3.32 | |
openldap | openldap | 2.3.33 | |
openldap | openldap | 2.3.34 | |
openldap | openldap | 2.3.35 | |
openldap | openldap | 2.3.36 | |
openldap | openldap | 2.3.37 | |
openldap | openldap | 2.3.38 | |
openldap | openldap | 2.3.39 | |
openldap | openldap | 2.3.40 | |
openldap | openldap | 2.3.41 | |
openldap | openldap | 2.3.42 | |
openldap | openldap | 2.3.43 | |
openldap | openldap | 2.4.3 | |
openldap | openldap | 2.4.6 | |
openldap | openldap | 2.4.7 | |
openldap | openldap | 2.4.8 | |
openldap | openldap | 2.4.9 | |
openldap | openldap | 2.4.10 | |
openldap | openldap | 2.4.11 | |
openldap | openldap | 2.4.12 | |
openldap | openldap | 2.4.13 | |
openldap | openldap | 2.4.14 | |
openldap | openldap | 2.4.15 | |
openldap | openldap | 2.4.16 | |
openldap | openldap | 2.4.17 | |
openldap | openldap | 2.4.18 | |
openldap | openldap | 2.4.19 | |
openldap | openldap | 2.4.20 | |
openldap | openldap | 2.4.21 | |
openldap | openldap | 2.4.22 | |
openldap | openldap | 2.4.23 | |
openldap | openldap | 2.4.24 | |
openldap | openldap | 2.4.25 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "C10F4BE9-3953-4822-9226-528C78136ED1", "versionEndIncluding": "2.4.26", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "086DC60F-F530-4515-8F3D-87F30DB9B322", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D538927-82D5-476E-9C85-2E9297316D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "2A904832-A6D6-45D4-B07C-79ED1FE47A80", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BB554A4-EEC2-4E17-9F32-27A580B9E389", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "191DB249-6A73-4561-8CCA-565D1525CB31", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "423F9D3A-6AA7-4D64-B872-2C867EEFC3DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "34A5D9A5-FB1D-4ACF-846A-4DB73196122C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "41400CE6-FA51-435C-93F7-B31FE42F18AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "6022ABEB-6825-4A5F-9884-74F94C2387F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "D2F15789-334D-460D-B5B3-FCC71087D107", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F77B1548-BB6D-4618-AE7B-E97F91A0AF5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1CC52235-72DA-4EF4-870A-AF25181DB56C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "B7064C52-1211-42B8-BF1F-C22D800AED07", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1CD95826-E44A-48C6-BAAB-77A905CAE6B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "FEEA6BB6-41FC-4F15-A95F-9B052F062454", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "E90766C1-6DBD-435C-85E1-920DAFA26D67", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "8CD13DAE-9588-4540-9183-FB80C507F985", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "526366F3-52F0-4816-A356-8F39B718C048", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "AC07AD0D-5DF9-41A4-8592-CEFF1842355D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "30017C56-42A9-4AF9-B5B3-7357E424F837", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "C8A51F38-3F5A-4F6D-93EE-776B5C2FF48F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "8DBEC27E-3220-42CE-B6CC-675F387CB506", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "E641DFFB-CBAF-4DCF-944F-443CFF836A53", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "A552E270-5C9C-40DC-B23D-97C8D995B8FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "53DF812C-E1F8-46D3-A072-3FBE696ADC33", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "552F2E25-DDB8-49A6-844A-8520696DBE5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "149EBFB7-B58F-4557-8E46-6DF88BB5E57E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "03D75A36-41C4-464F-8DC4-42C841ABC087", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C3EE919-D05C-4625-85FE-132F6F2B932C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "20D99A58-8D7E-4586-A9BF-1DD2A1DBB8D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DEBA0118-545E-4D7B-B819-34D157B2BA6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "67826609-F4CA-42CB-A5D0-B4503DDE2C92", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "61676BBD-95B8-44C9-BD66-79F00381BF86", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "719A9B1D-8E32-461F-BCD4-F72C6AD3E63E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "BFD73969-39F8-4849-AF6A-15ACDC2E4537", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DB8C1DD2-865A-4CF2-8137-3C40C01C9EAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "EE38B045-2224-43D1-8618-0885505865C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "5D26DAC5-EDBD-42D8-A877-1E6EA666D72B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.11_9:*:*:*:*:*:*:*", "matchCriteriaId": "E7AE325E-514C-40A1-AA56-D605377B5D90", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.11_11:*:*:*:*:*:*:*", "matchCriteriaId": "19397A11-E549-4F31-8007-8D5F3C0AABB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.11_11s:*:*:*:*:*:*:*", "matchCriteriaId": "1C659213-271D-4F22-AE14-A1646A612D2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67B0A2B6-C560-4AE0-BC79-3C7BC9163EE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "566406CE-368A-4799-A112-E5DFC5B333D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "E5CCC734-C15B-4D2B-BF83-F214F807C44E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "64796893-A90D-4B7D-BDBC-0087B57AF7E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "39914C6A-F4DB-43CC-B2B6-097365E55D34", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "5BFDD8F7-AAFD-453F-99A4-F9C0424EA791", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "0BFEEAA6-0B50-4644-A183-F5FEE7BD7EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "920FC1DB-95E2-4367-BF20-77D75BD7617D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "28E643F8-005A-4170-8275-8E4AB5C25209", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "C8A34C63-C17D-4026-B409-AA9A56529B87", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "4EA863B0-A6AB-44BD-84E8-B6C885EFFE10", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "24BFAEC7-6256-4B8F-83F5-60FBD1571936", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "83227371-ACC3-4217-BFF9-0A3AAADD50DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "734B8101-BEAC-40AB-81EA-2516CA20BC93", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "F0BD5253-FBC9-4384-8FC3-4E384582BE91", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "AA73658A-8834-4EC2-8D8F-3A7D1C834669", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "06BCE98E-546C-4852-BAE2-CF525A778B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "94284C78-255E-43B7-A33E-FBC25BABEA2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "4B298BAA-5584-4193-A3DB-31FBB0BD12B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "90604A40-A1F5-4F23-9B8C-472E8C794B59", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "1418EC80-2F42-4C1B-BA38-CA5BDEF83F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "9BC65FE9-348D-4468-A1EF-2AC5C673DB07", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "B3A400A0-B9D7-4CB2-82EA-49A599C2B30B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "65587514-46AB-4D70-B7C2-FBED7F78D13D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "7951BAAB-CB06-4F19-891A-E07E2B3C8701", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "82EC30A1-4150-44DC-89F7-5A64B8CC4A84", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "9DF04D97-A561-427B-9891-A1423B86F164", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "1E74B0C8-2D64-4BF2-B152-87909E3029EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "88F6CA0B-ED91-4085-8EE0-1F4256747621", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "B90657E7-D651-4E1E-8035-13A1F024E3C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "7BBE5477-BE27-412A-9BA9-9690F746B4F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "31300FA3-C57D-4564-927E-B06C0229BE8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "342E414D-8ED6-4E5A-88F0-57B5846A3EB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7C0BD0FD-BD80-4197-8479-BBB070DAB890", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "FC9CA4EF-61F1-407B-B2BF-B4AFD68F50BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "EB80C814-5B28-46CC-8237-70A558BF049C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "832AC063-6004-4A78-A964-45906361F9C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "E7C40DFD-4FB8-40AA-ABA4-194DED1241A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "992733F2-000F-4E27-8D19-AF18543E57BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "B36E0E49-D908-4A19-A621-6E7FB3E59A18", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "74779CA2-6741-4053-8C23-98A1F938B264", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "930DAA18-113F-42B0-8382-8579575D238F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "98F50353-EBFB-4DE5-8D35-80C672A12E41", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "18A4F43F-8E4F-4203-B640-02BBB28052A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "28063C54-EE5E-44EC-8D47-E880C2BB45BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1_.20:*:*:*:*:*:*:*", "matchCriteriaId": "E8BCFC49-6505-4713-A06C-A64782A34414", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BAE01BA8-416B-4419-99E5-81C1FA404FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C2F45B8-B9FB-4D43-B2DD-98413F5F2B85", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "0F611094-500A-4306-8C15-4878135FA45D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "32096DE5-3F2C-4FF7-BDC6-E316DFDC97A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FE197F27-CB34-4B0E-A30A-C9C87295AAD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "10A4256F-EC89-425F-86FD-B0DE243EBF2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "4A34127E-507D-4F72-9F93-B23F91DB0F53", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "B7A2D5D9-3E7E-4420-A338-B05A8C077229", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "C76EF100-3328-4C70-A123-50A4ECFF539E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "1DCE7803-E652-4A17-8EEB-B91C81CF48E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "DA5CB439-5F0B-40CF-8564-6875CAC74FCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB5E524E-1B71-46B5-A14E-C2342851C0FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "FE103338-9AE7-4230-A8B2-09273004B4D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "12621DED-ABF1-47A7-961C-E6DE1F6302AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "C8026929-4845-46E4-A6F8-E60CA498201B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "DE01BD68-D6DC-4220-A3F0-71961CEA205F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "68DE3F16-E171-4FA3-9B00-3F944A4E7604", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "63F7B718-0E5C-4900-A5DE-D59D37EC79D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "8B8805A0-F543-450D-82E9-EE923904E2A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.21:*:*:*:*:*:*:*", "matchCriteriaId": "58779045-578C-41D5-9CAE-D6F48C91654C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "969F18EF-067A-47BA-9DC4-9FA69D9DCBB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.23:*:*:*:*:*:*:*", "matchCriteriaId": "E12766AB-2AFE-4BBD-8B80-8BEA932ABDFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.24:*:*:*:*:*:*:*", "matchCriteriaId": "6C2C7514-8BB4-4B8A-A5AF-D4A26B232597", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.25:*:*:*:*:*:*:*", "matchCriteriaId": "64C0AB94-ED91-4218-8F97-862BA57D1CC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.26:*:*:*:*:*:*:*", "matchCriteriaId": "E2FF5C05-0A64-416C-8346-EE5FF4AA14F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.27:*:*:*:*:*:*:*", "matchCriteriaId": "5C081128-2846-4257-B822-10AADE54899D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D9090B1B-0724-4526-A40D-47044401B6EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "A5E5AC6E-F43B-404D-BA46-2F4412456ACB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "61AE77E5-6595-45A4-A233-C36B97F551B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "80224FC0-7DF5-4815-9D3D-63AC462119FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "F821D76D-1592-478B-AE7B-D16B22837C74", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "67146520-86CF-4EF6-88AC-22E2D167D686", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "2E8C5E2D-52FD-448B-9423-9F51349BEE4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "FCC99DDD-EF08-45B7-8369-1D52A03D6E58", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "C79D5E35-1F96-4AF5-B89A-A8FCD33D1FDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "B93B4C9A-5C0E-4226-9975-E26330A287A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "0F305125-0477-4C8F-9C94-39EB623E1A35", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "BF72A8C3-6DB5-494A-843F-D3CF57AAFDAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "45104882-4F43-4437-8B2E-2F6E97952C22", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.17:*:*:*:*:*:*:*", "matchCriteriaId": "2C2BDB6E-B620-4707-A2C4-0AC3E6536B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.18:*:*:*:*:*:*:*", "matchCriteriaId": "BC84EA72-7B34-454D-B46D-616596AF41B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.19:*:*:*:*:*:*:*", "matchCriteriaId": "4EE3F254-C565-4650-B875-116FD2C29867", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.20:*:*:*:*:*:*:*", "matchCriteriaId": "49B31BEE-944F-40FA-A173-EF55C2232834", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.21:*:*:*:*:*:*:*", "matchCriteriaId": "003A1BF0-1C40-4A5B-A724-25692199D2C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.22:*:*:*:*:*:*:*", "matchCriteriaId": "9D0298B8-44F5-4375-BBB4-107B1A9D1E17", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.23:*:*:*:*:*:*:*", "matchCriteriaId": "E94E748F-3367-4432-AA85-61767541A377", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.24:*:*:*:*:*:*:*", "matchCriteriaId": "E628F5CE-4D21-43D4-8789-99B32FA28A0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.25:*:*:*:*:*:*:*", "matchCriteriaId": "A4ECDC15-67A3-4432-B141-8EC38C440D6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.26:*:*:*:*:*:*:*", "matchCriteriaId": "BA382EA1-9ED6-4E10-89E7-3DD3A1FE7BBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.27:*:*:*:*:*:*:*", "matchCriteriaId": "6DCE01E9-3D72-433F-A600-B7359C1197FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.28:*:*:*:*:*:*:*", "matchCriteriaId": "75371593-00F5-4F49-B0EC-7835CB1DB97F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.29:*:*:*:*:*:*:*", "matchCriteriaId": "F45E2CED-46CA-4F85-AA38-DCA5141CCFFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.30:*:*:*:*:*:*:*", "matchCriteriaId": "9A1CDD24-F8E3-4C39-BD39-36ADEC814C41", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.31:*:*:*:*:*:*:*", "matchCriteriaId": "64E00372-FD22-45E5-8815-9B0826BE7857", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.32:*:*:*:*:*:*:*", "matchCriteriaId": "4C6B5E35-7109-4FE0-8E34-61C5CA0C5D05", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.33:*:*:*:*:*:*:*", "matchCriteriaId": "5C41A0F2-DBB7-48B6-AF89-7963CED8D196", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.34:*:*:*:*:*:*:*", "matchCriteriaId": "7B0A12F9-7DEA-4E3F-A3A8-3C9E782AC4BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.35:*:*:*:*:*:*:*", "matchCriteriaId": "06223A03-1598-4D0F-B0F6-576AA3CB1E96", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.36:*:*:*:*:*:*:*", "matchCriteriaId": "87155B64-0AE1-4418-8866-84CEA879665B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.37:*:*:*:*:*:*:*", "matchCriteriaId": "A563D3EA-7DE0-4DE7-AD64-8724B6E72A6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.38:*:*:*:*:*:*:*", "matchCriteriaId": "7AF66FA9-EE80-48DD-B10E-8D047CF4BC22", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.39:*:*:*:*:*:*:*", "matchCriteriaId": "1F11D98D-F23D-45B4-9733-B3C0C781ADCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.40:*:*:*:*:*:*:*", "matchCriteriaId": "2EFE64A8-3B40-44C9-983F-8F3BDC9879E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.41:*:*:*:*:*:*:*", "matchCriteriaId": "C51880E8-AA9E-43AD-BDC3-3DA530823AAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.42:*:*:*:*:*:*:*", "matchCriteriaId": "D58AC865-207C-4612-B112-AE430BB76213", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.43:*:*:*:*:*:*:*", "matchCriteriaId": "EF350C0B-E6BF-4626-BA1D-DED83358D86A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "1ADA863D-EF8B-4A06-B94E-3DBF53063E6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "5EC66226-A597-4A4C-932F-F4A7BAE119C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "4AEABC84-7B67-4FD4-A891-E52C80DC881E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "340F673A-295E-4B75-A9D1-E785B0440BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "49203E99-71E2-49D4-91A0-65AAAA7DC18F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "473AEC48-FBBF-4BEB-8728-1FA80DD94807", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "7B0415EA-5F21-44C3-93F3-DDADBAA64449", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "16AFC655-E81F-4FDE-8030-9781A8B79E73", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "E99FB859-D023-4B2B-A709-05E83A46E2A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "8D2EEBC7-1FAF-43E2-A124-C387C02D9E2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "95D242E4-D5EB-4785-A6EF-60B1E8E2B0EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "F6FEDD9C-FDF7-456A-B06C-0A4A4443991D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "9245CDE2-B90A-4D47-BA20-A7869FF0A645", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "FB993E4D-E573-4495-97DE-465DDB2AA2DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.19:*:*:*:*:*:*:*", "matchCriteriaId": "D0F106A3-63D5-4D07-9440-6628DBA78BE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.20:*:*:*:*:*:*:*", "matchCriteriaId": "36CC03BC-DF34-43CD-90B0-27D23A1DD06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.21:*:*:*:*:*:*:*", "matchCriteriaId": "16C90FEE-527E-47F5-8840-517A55163D8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.22:*:*:*:*:*:*:*", "matchCriteriaId": "0FAEA812-BB47-47A3-A975-B3B8D30DBA36", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.23:*:*:*:*:*:*:*", "matchCriteriaId": "5DE5D180-3972-40A0-ADAF-A4F3364D1381", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.24:*:*:*:*:*:*:*", "matchCriteriaId": "AD76F376-00D8-4917-BF68-6EECC316C331", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.25:*:*:*:*:*:*:*", "matchCriteriaId": "F7063C11-3BF5-4037-ADC3-0C7E9AF830B4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Off-by-one error in the UTF8StringNormalize function in OpenLDAP 2.4.26 and earlier allows remote attackers to cause a denial of service (slapd crash) via a zero-length string that triggers a heap-based buffer overflow, as demonstrated using an empty postalAddressAttribute value in an LDIF entry." }, { "lang": "es", "value": "Error por un paso en la funci\u00f3n UTF8StringNormalize en OpenLDAP 2.4.26 y versiones anteriores permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de slapd) a trav\u00e9s de una cadena de longitud cero que desencadena un desbordamiento de b\u00fafer basado en memoria din\u00e1mica, como se demuestra utilizando un valor vac\u00edo en el valor postalAddressAttribute en una entrada LDIF." } ], "id": "CVE-2011-4079", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-10-27T20:55:01.823", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/46599" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "source": "secalert@redhat.com", "url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commitdiff%3Bh=507238713b71208ec4f262f312cb495a302df9e9" }, { "source": "secalert@redhat.com", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7059%3Bselectid=7059" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2011/10/26/5" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2011/10/26/9" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/50384" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1266-1" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=749324" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70991" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/46599" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commitdiff%3Bh=507238713b71208ec4f262f312cb495a302df9e9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7059%3Bselectid=7059" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2011/10/26/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2011/10/26/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/50384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1266-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=749324" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70991" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Memory leak in the back-bdb backend for OpenLDAP 2.1.12 and earlier allows remote attackers to cause a denial of service (memory consumption).
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000685 | Patch | |
cve@mitre.org | http://secunia.com/advisories/9203 | Patch | |
cve@mitre.org | http://www.osvdb.org/17000 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000685 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/9203 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/17000 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | 1.0 | |
openldap | openldap | 1.0.1 | |
openldap | openldap | 1.0.2 | |
openldap | openldap | 1.0.3 | |
openldap | openldap | 1.1.0 | |
openldap | openldap | 1.1.1 | |
openldap | openldap | 1.1.2 | |
openldap | openldap | 1.1.3 | |
openldap | openldap | 1.1.4 | |
openldap | openldap | 1.2.0 | |
openldap | openldap | 1.2.1 | |
openldap | openldap | 1.2.2 | |
openldap | openldap | 1.2.3 | |
openldap | openldap | 1.2.4 | |
openldap | openldap | 1.2.5 | |
openldap | openldap | 1.2.6 | |
openldap | openldap | 1.2.7 | |
openldap | openldap | 1.2.8 | |
openldap | openldap | 1.2.9 | |
openldap | openldap | 1.2.10 | |
openldap | openldap | 1.2.11 | |
openldap | openldap | 1.2.12 | |
openldap | openldap | 1.2.13 | |
openldap | openldap | 2.0.0 | |
openldap | openldap | 2.0.1 | |
openldap | openldap | 2.0.2 | |
openldap | openldap | 2.0.3 | |
openldap | openldap | 2.0.4 | |
openldap | openldap | 2.0.5 | |
openldap | openldap | 2.0.6 | |
openldap | openldap | 2.0.7 | |
openldap | openldap | 2.0.8 | |
openldap | openldap | 2.0.9 | |
openldap | openldap | 2.0.10 | |
openldap | openldap | 2.0.11 | |
openldap | openldap | 2.0.12 | |
openldap | openldap | 2.0.13 | |
openldap | openldap | 2.0.14 | |
openldap | openldap | 2.0.15 | |
openldap | openldap | 2.0.16 | |
openldap | openldap | 2.0.17 | |
openldap | openldap | 2.0.18 | |
openldap | openldap | 2.0.19 | |
openldap | openldap | 2.0.20 | |
openldap | openldap | 2.0.21 | |
openldap | openldap | 2.0.22 | |
openldap | openldap | 2.0.23 | |
openldap | openldap | 2.0.24 | |
openldap | openldap | 2.0.25 | |
openldap | openldap | 2.0.26 | |
openldap | openldap | 2.0.27 | |
openldap | openldap | 2.1.2 | |
openldap | openldap | 2.1.3 | |
openldap | openldap | 2.1.4 | |
openldap | openldap | 2.1.5 | |
openldap | openldap | 2.1.6 | |
openldap | openldap | 2.1.7 | |
openldap | openldap | 2.1.8 | |
openldap | openldap | 2.1.9 | |
openldap | openldap | 2.1.10 | |
openldap | openldap | 2.1.11 | |
openldap | openldap | 2.1.12 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "086DC60F-F530-4515-8F3D-87F30DB9B322", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D538927-82D5-476E-9C85-2E9297316D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "2A904832-A6D6-45D4-B07C-79ED1FE47A80", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BB554A4-EEC2-4E17-9F32-27A580B9E389", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "423F9D3A-6AA7-4D64-B872-2C867EEFC3DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "34A5D9A5-FB1D-4ACF-846A-4DB73196122C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "41400CE6-FA51-435C-93F7-B31FE42F18AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "6022ABEB-6825-4A5F-9884-74F94C2387F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "D2F15789-334D-460D-B5B3-FCC71087D107", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1CC52235-72DA-4EF4-870A-AF25181DB56C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "B7064C52-1211-42B8-BF1F-C22D800AED07", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1CD95826-E44A-48C6-BAAB-77A905CAE6B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "FEEA6BB6-41FC-4F15-A95F-9B052F062454", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "E90766C1-6DBD-435C-85E1-920DAFA26D67", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "8CD13DAE-9588-4540-9183-FB80C507F985", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "526366F3-52F0-4816-A356-8F39B718C048", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "AC07AD0D-5DF9-41A4-8592-CEFF1842355D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "30017C56-42A9-4AF9-B5B3-7357E424F837", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "C8A51F38-3F5A-4F6D-93EE-776B5C2FF48F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "8DBEC27E-3220-42CE-B6CC-675F387CB506", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "E641DFFB-CBAF-4DCF-944F-443CFF836A53", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "A552E270-5C9C-40DC-B23D-97C8D995B8FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "53DF812C-E1F8-46D3-A072-3FBE696ADC33", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "149EBFB7-B58F-4557-8E46-6DF88BB5E57E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "03D75A36-41C4-464F-8DC4-42C841ABC087", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C3EE919-D05C-4625-85FE-132F6F2B932C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "20D99A58-8D7E-4586-A9BF-1DD2A1DBB8D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DEBA0118-545E-4D7B-B819-34D157B2BA6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "67826609-F4CA-42CB-A5D0-B4503DDE2C92", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "61676BBD-95B8-44C9-BD66-79F00381BF86", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "719A9B1D-8E32-461F-BCD4-F72C6AD3E63E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "BFD73969-39F8-4849-AF6A-15ACDC2E4537", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DB8C1DD2-865A-4CF2-8137-3C40C01C9EAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "EE38B045-2224-43D1-8618-0885505865C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "5D26DAC5-EDBD-42D8-A877-1E6EA666D72B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67B0A2B6-C560-4AE0-BC79-3C7BC9163EE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "566406CE-368A-4799-A112-E5DFC5B333D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "E5CCC734-C15B-4D2B-BF83-F214F807C44E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "64796893-A90D-4B7D-BDBC-0087B57AF7E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "39914C6A-F4DB-43CC-B2B6-097365E55D34", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "5BFDD8F7-AAFD-453F-99A4-F9C0424EA791", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "0BFEEAA6-0B50-4644-A183-F5FEE7BD7EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "920FC1DB-95E2-4367-BF20-77D75BD7617D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "28E643F8-005A-4170-8275-8E4AB5C25209", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "C8A34C63-C17D-4026-B409-AA9A56529B87", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "4EA863B0-A6AB-44BD-84E8-B6C885EFFE10", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "24BFAEC7-6256-4B8F-83F5-60FBD1571936", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "83227371-ACC3-4217-BFF9-0A3AAADD50DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "734B8101-BEAC-40AB-81EA-2516CA20BC93", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "F0BD5253-FBC9-4384-8FC3-4E384582BE91", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "AA73658A-8834-4EC2-8D8F-3A7D1C834669", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "06BCE98E-546C-4852-BAE2-CF525A778B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "94284C78-255E-43B7-A33E-FBC25BABEA2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "4B298BAA-5584-4193-A3DB-31FBB0BD12B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "90604A40-A1F5-4F23-9B8C-472E8C794B59", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "1418EC80-2F42-4C1B-BA38-CA5BDEF83F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "9BC65FE9-348D-4468-A1EF-2AC5C673DB07", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "B3A400A0-B9D7-4CB2-82EA-49A599C2B30B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "65587514-46AB-4D70-B7C2-FBED7F78D13D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "7951BAAB-CB06-4F19-891A-E07E2B3C8701", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "82EC30A1-4150-44DC-89F7-5A64B8CC4A84", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "9DF04D97-A561-427B-9891-A1423B86F164", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory leak in the back-bdb backend for OpenLDAP 2.1.12 and earlier allows remote attackers to cause a denial of service (memory consumption)." } ], "id": "CVE-2004-1880", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000685" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://secunia.com/advisories/9203" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/17000" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000685" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://secunia.com/advisories/9203" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/17000" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Not vulnerable. These issues did not affect the versions of OpenLDAP as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.\n", "lastModified": "2006-08-30T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-09-07 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
OpenLDAP 1.0 through 2.1.19, as used in Apple Mac OS 10.3.4 and 10.3.5 and possibly other operating systems, may allow certain authentication schemes to use hashed (crypt) passwords in the userPassword attribute as if they were plaintext passwords, which allows remote attackers to re-use hashed passwords without decrypting them.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/12491/ | Patch, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/17233 | ||
cve@mitre.org | http://secunia.com/advisories/21520 | ||
cve@mitre.org | http://support.avaya.com/elmodocs2/security/ASA-2006-157.htm | ||
cve@mitre.org | http://www.auscert.org.au/render.html?it=4363 | Patch, Vendor Advisory | |
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2005-751.html | ||
cve@mitre.org | http://www.securityfocus.com/advisories/7148 | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/11137 | Patch, Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/17300 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10703 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/12491/ | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/17233 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21520 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://support.avaya.com/elmodocs2/security/ASA-2006-157.htm | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.auscert.org.au/render.html?it=4363 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2005-751.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/advisories/7148 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/11137 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/17300 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10703 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | 1.0 | |
openldap | openldap | 1.0.1 | |
openldap | openldap | 1.0.2 | |
openldap | openldap | 1.0.3 | |
openldap | openldap | 1.1 | |
openldap | openldap | 1.1.1 | |
openldap | openldap | 1.1.2 | |
openldap | openldap | 1.1.3 | |
openldap | openldap | 1.1.4 | |
openldap | openldap | 1.2 | |
openldap | openldap | 1.2.1 | |
openldap | openldap | 1.2.2 | |
openldap | openldap | 1.2.3 | |
openldap | openldap | 1.2.4 | |
openldap | openldap | 1.2.5 | |
openldap | openldap | 1.2.6 | |
openldap | openldap | 1.2.7 | |
openldap | openldap | 1.2.8 | |
openldap | openldap | 1.2.9 | |
openldap | openldap | 1.2.10 | |
openldap | openldap | 1.2.11 | |
openldap | openldap | 1.2.12 | |
openldap | openldap | 1.2.13 | |
openldap | openldap | 2.0 | |
openldap | openldap | 2.0.1 | |
openldap | openldap | 2.0.2 | |
openldap | openldap | 2.0.3 | |
openldap | openldap | 2.0.4 | |
openldap | openldap | 2.0.5 | |
openldap | openldap | 2.0.6 | |
openldap | openldap | 2.0.7 | |
openldap | openldap | 2.0.8 | |
openldap | openldap | 2.0.9 | |
openldap | openldap | 2.0.10 | |
openldap | openldap | 2.0.11 | |
openldap | openldap | 2.0.11_9 | |
openldap | openldap | 2.0.11_11 | |
openldap | openldap | 2.0.11_11s | |
openldap | openldap | 2.0.12 | |
openldap | openldap | 2.0.13 | |
openldap | openldap | 2.0.14 | |
openldap | openldap | 2.0.15 | |
openldap | openldap | 2.0.16 | |
openldap | openldap | 2.0.17 | |
openldap | openldap | 2.0.18 | |
openldap | openldap | 2.0.19 | |
openldap | openldap | 2.0.20 | |
openldap | openldap | 2.0.21 | |
openldap | openldap | 2.0.22 | |
openldap | openldap | 2.0.23 | |
openldap | openldap | 2.0.25 | |
openldap | openldap | 2.0.27 | |
openldap | openldap | 2.1.4 | |
openldap | openldap | 2.1.10 | |
openldap | openldap | 2.1.11 | |
openldap | openldap | 2.1.12 | |
openldap | openldap | 2.1.13 | |
openldap | openldap | 2.1.14 | |
openldap | openldap | 2.1.15 | |
openldap | openldap | 2.1.16 | |
openldap | openldap | 2.1.17 | |
openldap | openldap | 2.1.18 | |
openldap | openldap | 2.1.19 | |
openldap | openldap | 2.1_.20 | |
apple | mac_os_x | 10.2.8 | |
apple | mac_os_x | 10.3.4 | |
apple | mac_os_x | 10.3.5 | |
apple | mac_os_x_server | 10.2.8 | |
apple | mac_os_x_server | 10.3.4 | |
apple | mac_os_x_server | 10.3.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "086DC60F-F530-4515-8F3D-87F30DB9B322", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D538927-82D5-476E-9C85-2E9297316D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "2A904832-A6D6-45D4-B07C-79ED1FE47A80", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BB554A4-EEC2-4E17-9F32-27A580B9E389", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "191DB249-6A73-4561-8CCA-565D1525CB31", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "34A5D9A5-FB1D-4ACF-846A-4DB73196122C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "41400CE6-FA51-435C-93F7-B31FE42F18AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "6022ABEB-6825-4A5F-9884-74F94C2387F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "D2F15789-334D-460D-B5B3-FCC71087D107", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F77B1548-BB6D-4618-AE7B-E97F91A0AF5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "B7064C52-1211-42B8-BF1F-C22D800AED07", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1CD95826-E44A-48C6-BAAB-77A905CAE6B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "FEEA6BB6-41FC-4F15-A95F-9B052F062454", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "E90766C1-6DBD-435C-85E1-920DAFA26D67", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "8CD13DAE-9588-4540-9183-FB80C507F985", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "526366F3-52F0-4816-A356-8F39B718C048", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "AC07AD0D-5DF9-41A4-8592-CEFF1842355D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "30017C56-42A9-4AF9-B5B3-7357E424F837", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "C8A51F38-3F5A-4F6D-93EE-776B5C2FF48F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "8DBEC27E-3220-42CE-B6CC-675F387CB506", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "E641DFFB-CBAF-4DCF-944F-443CFF836A53", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "A552E270-5C9C-40DC-B23D-97C8D995B8FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "53DF812C-E1F8-46D3-A072-3FBE696ADC33", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "552F2E25-DDB8-49A6-844A-8520696DBE5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "03D75A36-41C4-464F-8DC4-42C841ABC087", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C3EE919-D05C-4625-85FE-132F6F2B932C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "20D99A58-8D7E-4586-A9BF-1DD2A1DBB8D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DEBA0118-545E-4D7B-B819-34D157B2BA6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "67826609-F4CA-42CB-A5D0-B4503DDE2C92", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "61676BBD-95B8-44C9-BD66-79F00381BF86", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "719A9B1D-8E32-461F-BCD4-F72C6AD3E63E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "BFD73969-39F8-4849-AF6A-15ACDC2E4537", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DB8C1DD2-865A-4CF2-8137-3C40C01C9EAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "EE38B045-2224-43D1-8618-0885505865C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "5D26DAC5-EDBD-42D8-A877-1E6EA666D72B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.11_9:*:*:*:*:*:*:*", "matchCriteriaId": "E7AE325E-514C-40A1-AA56-D605377B5D90", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.11_11:*:*:*:*:*:*:*", "matchCriteriaId": "19397A11-E549-4F31-8007-8D5F3C0AABB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.11_11s:*:*:*:*:*:*:*", "matchCriteriaId": "1C659213-271D-4F22-AE14-A1646A612D2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67B0A2B6-C560-4AE0-BC79-3C7BC9163EE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "566406CE-368A-4799-A112-E5DFC5B333D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "E5CCC734-C15B-4D2B-BF83-F214F807C44E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "64796893-A90D-4B7D-BDBC-0087B57AF7E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "39914C6A-F4DB-43CC-B2B6-097365E55D34", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "5BFDD8F7-AAFD-453F-99A4-F9C0424EA791", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "0BFEEAA6-0B50-4644-A183-F5FEE7BD7EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "920FC1DB-95E2-4367-BF20-77D75BD7617D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "28E643F8-005A-4170-8275-8E4AB5C25209", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "C8A34C63-C17D-4026-B409-AA9A56529B87", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "4EA863B0-A6AB-44BD-84E8-B6C885EFFE10", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "24BFAEC7-6256-4B8F-83F5-60FBD1571936", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "734B8101-BEAC-40AB-81EA-2516CA20BC93", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "AA73658A-8834-4EC2-8D8F-3A7D1C834669", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "4B298BAA-5584-4193-A3DB-31FBB0BD12B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "7951BAAB-CB06-4F19-891A-E07E2B3C8701", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "82EC30A1-4150-44DC-89F7-5A64B8CC4A84", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "9DF04D97-A561-427B-9891-A1423B86F164", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "1E74B0C8-2D64-4BF2-B152-87909E3029EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "88F6CA0B-ED91-4085-8EE0-1F4256747621", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "B90657E7-D651-4E1E-8035-13A1F024E3C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "7BBE5477-BE27-412A-9BA9-9690F746B4F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "31300FA3-C57D-4564-927E-B06C0229BE8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "342E414D-8ED6-4E5A-88F0-57B5846A3EB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7C0BD0FD-BD80-4197-8479-BBB070DAB890", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1_.20:*:*:*:*:*:*:*", "matchCriteriaId": "E8BCFC49-6505-4713-A06C-A64782A34414", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "AB461678-560D-436E-A3AE-9E1E16DB0412", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "421079DA-B605-4E05-9454-C30CF7631CF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "93B734BA-3435-40A9-B22B-5D56CEB865A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "38F17066-C090-4DD7-A1AC-D8FF70D268CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "3CA6BD2A-3022-408D-8E4F-50865996E965", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "463D5628-7536-4029-99D6-5E525050059E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenLDAP 1.0 through 2.1.19, as used in Apple Mac OS 10.3.4 and 10.3.5 and possibly other operating systems, may allow certain authentication schemes to use hashed (crypt) passwords in the userPassword attribute as if they were plaintext passwords, which allows remote attackers to re-use hashed passwords without decrypting them." } ], "id": "CVE-2004-0823", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-09-07T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/12491/" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/17233" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/21520" }, { "source": "cve@mitre.org", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-157.htm" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.auscert.org.au/render.html?it=4363" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2005-751.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/advisories/7148" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/11137" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17300" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10703" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/12491/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/17233" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/21520" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-157.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.auscert.org.au/render.html?it=4363" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2005-751.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/advisories/7148" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/11137" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17300" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10703" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-04 20:15
Modified
2024-11-21 06:58
Severity ?
Summary
In OpenLDAP 2.x before 2.5.12 and 2.6.x before 2.6.2, a SQL injection vulnerability exists in the experimental back-sql backend to slapd, via a SQL statement within an LDAP query. This can occur during an LDAP search operation when the search filter is processed, due to a lack of proper escaping.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://bugs.openldap.org/show_bug.cgi?id=9815 | Exploit, Issue Tracking, Vendor Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20220609-0007/ | Third Party Advisory | |
cve@mitre.org | https://www.debian.org/security/2022/dsa-5140 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.openldap.org/show_bug.cgi?id=9815 | Exploit, Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20220609-0007/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2022/dsa-5140 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
openldap | openldap | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
debian | debian_linux | 11.0 | |
netapp | h300s_firmware | - | |
netapp | h300s | - | |
netapp | h500s_firmware | - | |
netapp | h500s | - | |
netapp | h700s_firmware | - | |
netapp | h700s | - | |
netapp | h700e_firmware | - | |
netapp | h700e | - | |
netapp | h410s_firmware | - | |
netapp | h410s | - | |
netapp | h410c_firmware | - | |
netapp | h410c | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FD488E2-1F66-45E6-A74C-562F060829AA", "versionEndExcluding": "2.5.12", "versionStartIncluding": "2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "23980864-0008-4011-B82B-B7DC5E988AA2", "versionEndExcluding": "2.6.2", "versionStartIncluding": "2.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FEB3337-BFDE-462A-908B-176F92053CEC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*", "matchCriteriaId": "736AEAE9-782B-4F71-9893-DED53367E102", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In OpenLDAP 2.x before 2.5.12 and 2.6.x before 2.6.2, a SQL injection vulnerability exists in the experimental back-sql backend to slapd, via a SQL statement within an LDAP query. This can occur during an LDAP search operation when the search filter is processed, due to a lack of proper escaping." }, { "lang": "es", "value": "En OpenLDAP versiones 2.x anteriores a 2.5.12 y versiones 2.6.x anteriores a 2.6.2, se presenta una vulnerabilidad de inyecci\u00f3n SQL en el backend experimental back-sql de slapd, por medio de una sentencia SQL dentro de una consulta LDAP. Esto puede ocurrir durante una operaci\u00f3n de b\u00fasqueda LDAP cuando es procesado el filtro de b\u00fasqueda, debido a una falta de escapes apropiados" } ], "id": "CVE-2022-29155", "lastModified": "2024-11-21T06:58:36.057", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-04T20:15:07.690", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9815" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220609-0007/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9815" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220609-0007/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5140" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-01-26 18:15
Modified
2024-11-21 05:29
Severity ?
Summary
A flaw was discovered in ldap_X509dn2bv in OpenLDAP before 2.4.57 leading to a slapd crash in the X.509 DN parsing in ad_keystring, resulting in denial of service.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/64 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/65 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/70 | Mailing List, Third Party Advisory | |
cve@mitre.org | https://bugs.openldap.org/show_bug.cgi?id=9425 | Issue Tracking, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/commit/4bdfffd2889c0c5cdf58bebafbdc8fce4bb2bff0 | Patch, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20210226-0002/ | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212529 | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212530 | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212531 | Third Party Advisory | |
cve@mitre.org | https://www.debian.org/security/2021/dsa-4845 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/64 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/65 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/70 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.openldap.org/show_bug.cgi?id=9425 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/commit/4bdfffd2889c0c5cdf58bebafbdc8fce4bb2bff0 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20210226-0002/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212529 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212530 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212531 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2021/dsa-4845 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
apple | mac_os_x | * | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | macos | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "2192B6C0-FDC8-4609-B6C4-C78633717D07", "versionEndExcluding": "2.4.57", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E76BECE-0843-4B9F-90DE-7690764701B0", "versionEndExcluding": "10.14.6", "versionStartIncluding": "10.14.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*", "matchCriteriaId": "693E7DAE-BBF0-4D48-9F8A-20DDBD4AAC0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*", "matchCriteriaId": "A369D48B-6A0A-47AE-9513-D5E2E6F30931", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*", "matchCriteriaId": "510F8317-94DA-498E-927A-83D5F41AF54A", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*", "matchCriteriaId": "0D5D1970-6D2A-42CA-A203-42023D71730D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*", "matchCriteriaId": "C68AE52B-5139-40A4-AE9A-E752DBF07D1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*", "matchCriteriaId": "0FD3467D-7679-479F-9C0B-A93F7CD0929D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*", "matchCriteriaId": "D4C6098E-EDBD-4A85-8282-B2E9D9333872", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*", "matchCriteriaId": "518BB47B-DD76-4E8C-9F10-7EBC1E146191", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*", "matchCriteriaId": "63940A55-D851-46EB-9668-D82BEFC1FE95", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*", "matchCriteriaId": "68C7A97A-3801-44FA-96CA-10298FA39883", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*", "matchCriteriaId": "6D69914D-46C7-4A0E-A075-C863C1692D33", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*", "matchCriteriaId": "9CDB4476-B521-43E4-A129-8718A8E0A8CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*", "matchCriteriaId": "9D072B77-BE3F-4A2E-B66A-E2C8DC3781E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*", "matchCriteriaId": "A4A6BF78-B772-435C-AC1A-2199027CCF9E", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-003:*:*:*:*:*:*", "matchCriteriaId": "9A233DE4-D09A-4157-B852-E675889DD4C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*", "matchCriteriaId": "2C88BD98-46F5-447F-963A-FB9B167E31BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*", "matchCriteriaId": "C7A0615B-D958-4BBF-B53F-AA839A0FE845", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "617E79BC-1012-4778-BDE7-44A238CC8D7A", "versionEndExcluding": "11.4", "versionStartIncluding": "11.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was discovered in ldap_X509dn2bv in OpenLDAP before 2.4.57 leading to a slapd crash in the X.509 DN parsing in ad_keystring, resulting in denial of service." }, { "lang": "es", "value": "Se detect\u00f3 un fallo en ldap_X509dn2bv en OpenLDAP versiones anteriores a 2.4.57, conllevando un bloqueo de slapd en el an\u00e1lisis del DN X.509 en ad_keystring, resultando en una denegaci\u00f3n de servicio" } ], "id": "CVE-2020-36229", "lastModified": "2024-11-21T05:29:06.060", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-26T18:15:57.287", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9425" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/4bdfffd2889c0c5cdf58bebafbdc8fce4bb2bff0" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212529" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212530" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212531" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9425" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/4bdfffd2889c0c5cdf58bebafbdc8fce4bb2bff0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4845" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-02-05 18:55
Modified
2025-04-11 00:51
Severity ?
Summary
The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 | ||
secalert@redhat.com | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735 | ||
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2014-0126.html | ||
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2014-0206.html | ||
secalert@redhat.com | http://seclists.org/fulldisclosure/2019/Dec/26 | ||
secalert@redhat.com | http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-4449 | ||
secalert@redhat.com | http://www.debian.org/security/2015/dsa-3209 | ||
secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2014:026 | ||
secalert@redhat.com | http://www.openldap.org/its/index.cgi/Incoming?id=7723 | ||
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2013/10/19/3 | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html | ||
secalert@redhat.com | http://www.securityfocus.com/bid/63190 | ||
secalert@redhat.com | http://www.securitytracker.com/id/1029711 | ||
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1019490 | ||
secalert@redhat.com | https://seclists.org/bugtraq/2019/Dec/23 | ||
secalert@redhat.com | https://support.apple.com/kb/HT210788 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2014-0126.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2014-0206.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2019/Dec/26 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-4449 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2015/dsa-3209 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2014:026 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/its/index.cgi/Incoming?id=7723 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2013/10/19/3 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/63190 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1029711 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1019490 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2019/Dec/23 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT210788 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
debian | debian_linux | 7.0 | |
debian | debian_linux | 8.0 | |
openldap | openldap | * | |
openldap | openldap | 2.4.6 | |
openldap | openldap | 2.4.7 | |
openldap | openldap | 2.4.8 | |
openldap | openldap | 2.4.9 | |
openldap | openldap | 2.4.10 | |
openldap | openldap | 2.4.11 | |
openldap | openldap | 2.4.12 | |
openldap | openldap | 2.4.13 | |
openldap | openldap | 2.4.14 | |
openldap | openldap | 2.4.15 | |
openldap | openldap | 2.4.16 | |
openldap | openldap | 2.4.17 | |
openldap | openldap | 2.4.18 | |
openldap | openldap | 2.4.19 | |
openldap | openldap | 2.4.20 | |
openldap | openldap | 2.4.21 | |
openldap | openldap | 2.4.22 | |
openldap | openldap | 2.4.23 | |
openldap | openldap | 2.4.24 | |
openldap | openldap | 2.4.25 | |
openldap | openldap | 2.4.26 | |
openldap | openldap | 2.4.27 | |
openldap | openldap | 2.4.28 | |
openldap | openldap | 2.4.29 | |
openldap | openldap | 2.4.30 | |
openldap | openldap | 2.4.31 | |
openldap | openldap | 2.4.32 | |
openldap | openldap | 2.4.33 | |
openldap | openldap | 2.4.34 | |
openldap | openldap | 2.4.35 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8A79462-B8A3-4822-A496-AE2A71F706DC", "versionEndIncluding": "2.4.36", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "5EC66226-A597-4A4C-932F-F4A7BAE119C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "4AEABC84-7B67-4FD4-A891-E52C80DC881E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "340F673A-295E-4B75-A9D1-E785B0440BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "49203E99-71E2-49D4-91A0-65AAAA7DC18F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "473AEC48-FBBF-4BEB-8728-1FA80DD94807", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "7B0415EA-5F21-44C3-93F3-DDADBAA64449", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "16AFC655-E81F-4FDE-8030-9781A8B79E73", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "E99FB859-D023-4B2B-A709-05E83A46E2A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "8D2EEBC7-1FAF-43E2-A124-C387C02D9E2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "95D242E4-D5EB-4785-A6EF-60B1E8E2B0EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "F6FEDD9C-FDF7-456A-B06C-0A4A4443991D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "9245CDE2-B90A-4D47-BA20-A7869FF0A645", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "FB993E4D-E573-4495-97DE-465DDB2AA2DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.19:*:*:*:*:*:*:*", "matchCriteriaId": "D0F106A3-63D5-4D07-9440-6628DBA78BE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.20:*:*:*:*:*:*:*", "matchCriteriaId": "36CC03BC-DF34-43CD-90B0-27D23A1DD06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.21:*:*:*:*:*:*:*", "matchCriteriaId": "16C90FEE-527E-47F5-8840-517A55163D8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.22:*:*:*:*:*:*:*", "matchCriteriaId": "0FAEA812-BB47-47A3-A975-B3B8D30DBA36", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.23:*:*:*:*:*:*:*", "matchCriteriaId": "5DE5D180-3972-40A0-ADAF-A4F3364D1381", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.24:*:*:*:*:*:*:*", "matchCriteriaId": "AD76F376-00D8-4917-BF68-6EECC316C331", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.25:*:*:*:*:*:*:*", "matchCriteriaId": "F7063C11-3BF5-4037-ADC3-0C7E9AF830B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.26:*:*:*:*:*:*:*", "matchCriteriaId": "CAE258EA-1B57-4189-AD5A-7E2ACF223167", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.27:*:*:*:*:*:*:*", "matchCriteriaId": "C492F5F5-A6FD-4BED-890A-79254138CC0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.28:*:*:*:*:*:*:*", "matchCriteriaId": "A6F7FDE8-2E54-4162-AA5F-D81253AAC8FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.29:*:*:*:*:*:*:*", "matchCriteriaId": "693E3145-FDDB-4780-886B-6D7FC7B2C5B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.30:*:*:*:*:*:*:*", "matchCriteriaId": "1BF32056-CC6A-4B2B-8FAA-F573445B9B99", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.31:*:*:*:*:*:*:*", "matchCriteriaId": "93B99338-4A1A-4483-8308-49BCCB325C30", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.32:*:*:*:*:*:*:*", "matchCriteriaId": "FE652CE3-E16B-4062-8253-F3FB52A651EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.33:*:*:*:*:*:*:*", "matchCriteriaId": "2A30ED6D-1DB8-4563-B131-1532F97F9694", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.34:*:*:*:*:*:*:*", "matchCriteriaId": "7764366D-29BB-4D75-A33C-7C17DA7496DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.35:*:*:*:*:*:*:*", "matchCriteriaId": "0A38D99B-370E-430A-A657-CD9FF72D0863", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search." }, { "lang": "es", "value": "El overlay rwm en OpenLDAP 2.4.23, 2.4.36 y anteriores no cuenta debidamente las referencias, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de slapd) mediante la desvinculaci\u00f3n inmediata despu\u00e9s de una solicitud de b\u00fasqueda, lo que provoca que rwm_conn_destroy libere la sesi\u00f3n mientras que est\u00e1 siendo utilizado por rwm_op_search." } ], "id": "CVE-2013-4449", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-02-05T18:55:06.317", "references": [ { "source": "secalert@redhat.com", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "source": "secalert@redhat.com", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10735" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-0126.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-0206.html" }, { "source": "secalert@redhat.com", "url": "http://seclists.org/fulldisclosure/2019/Dec/26" }, { "source": "secalert@redhat.com", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-4449" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2015/dsa-3209" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:026" }, { "source": "secalert@redhat.com", "url": "http://www.openldap.org/its/index.cgi/Incoming?id=7723" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2013/10/19/3" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/63190" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1029711" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019490" }, { "source": "secalert@redhat.com", "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "source": "secalert@redhat.com", "url": "https://support.apple.com/kb/HT210788" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10735" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-0126.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-0206.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2019/Dec/26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-4449" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3209" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:026" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openldap.org/its/index.cgi/Incoming?id=7723" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2013/10/19/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/63190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1029711" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019490" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/kb/HT210788" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-01-26 18:15
Modified
2024-11-21 05:29
Severity ?
Summary
A flaw was discovered in OpenLDAP before 2.4.57 leading to an assertion failure in slapd in the saslAuthzTo validation, resulting in denial of service.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/64 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/65 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/70 | Mailing List, Third Party Advisory | |
cve@mitre.org | https://bugs.openldap.org/show_bug.cgi?id=9406 | Issue Tracking, Vendor Advisory | |
cve@mitre.org | https://bugs.openldap.org/show_bug.cgi?id=9407 | Issue Tracking, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/commit/02dfc32d658fadc25e4040f78e36592f6e1e1ca0 | Patch, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed | Patch, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed.aa | Broken Link | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20210226-0002/ | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212529 | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212530 | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212531 | Third Party Advisory | |
cve@mitre.org | https://www.debian.org/security/2021/dsa-4845 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/64 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/65 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/70 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.openldap.org/show_bug.cgi?id=9406 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.openldap.org/show_bug.cgi?id=9407 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/commit/02dfc32d658fadc25e4040f78e36592f6e1e1ca0 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed.aa | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20210226-0002/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212529 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212530 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212531 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2021/dsa-4845 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
apple | mac_os_x | * | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | macos | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "2192B6C0-FDC8-4609-B6C4-C78633717D07", "versionEndExcluding": "2.4.57", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E76BECE-0843-4B9F-90DE-7690764701B0", "versionEndExcluding": "10.14.6", "versionStartIncluding": "10.14.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*", "matchCriteriaId": "693E7DAE-BBF0-4D48-9F8A-20DDBD4AAC0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*", "matchCriteriaId": "A369D48B-6A0A-47AE-9513-D5E2E6F30931", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*", "matchCriteriaId": "510F8317-94DA-498E-927A-83D5F41AF54A", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*", "matchCriteriaId": "0D5D1970-6D2A-42CA-A203-42023D71730D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*", "matchCriteriaId": "C68AE52B-5139-40A4-AE9A-E752DBF07D1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*", "matchCriteriaId": "0FD3467D-7679-479F-9C0B-A93F7CD0929D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*", "matchCriteriaId": "D4C6098E-EDBD-4A85-8282-B2E9D9333872", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*", "matchCriteriaId": "518BB47B-DD76-4E8C-9F10-7EBC1E146191", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*", "matchCriteriaId": "63940A55-D851-46EB-9668-D82BEFC1FE95", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*", "matchCriteriaId": "68C7A97A-3801-44FA-96CA-10298FA39883", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*", "matchCriteriaId": "6D69914D-46C7-4A0E-A075-C863C1692D33", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*", "matchCriteriaId": "9CDB4476-B521-43E4-A129-8718A8E0A8CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*", "matchCriteriaId": "9D072B77-BE3F-4A2E-B66A-E2C8DC3781E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*", "matchCriteriaId": "A4A6BF78-B772-435C-AC1A-2199027CCF9E", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-003:*:*:*:*:*:*", "matchCriteriaId": "9A233DE4-D09A-4157-B852-E675889DD4C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*", "matchCriteriaId": "2C88BD98-46F5-447F-963A-FB9B167E31BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*", "matchCriteriaId": "C7A0615B-D958-4BBF-B53F-AA839A0FE845", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "617E79BC-1012-4778-BDE7-44A238CC8D7A", "versionEndExcluding": "11.4", "versionStartIncluding": "11.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was discovered in OpenLDAP before 2.4.57 leading to an assertion failure in slapd in the saslAuthzTo validation, resulting in denial of service." }, { "lang": "es", "value": "Se detect\u00f3 un fallo en OpenLDAP versiones anteriores a 2.4.57, conllevando a un fallo de aserci\u00f3n en slapd en la comprobaci\u00f3n de saslAuthzTo, resultando en una denegaci\u00f3n de servicio" } ], "id": "CVE-2020-36222", "lastModified": "2024-11-21T05:29:04.397", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-26T18:15:56.770", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9406" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9407" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/02dfc32d658fadc25e4040f78e36592f6e1e1ca0" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed.aa" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212529" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212530" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212531" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9406" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9407" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/02dfc32d658fadc25e4040f78e36592f6e1e1ca0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed.aa" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4845" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-617" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-01-26 18:15
Modified
2024-11-21 05:29
Severity ?
Summary
A flaw was discovered in OpenLDAP before 2.4.57 leading to an infinite loop in slapd with the cancel_extop Cancel operation, resulting in denial of service.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/64 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/65 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/70 | Mailing List, Third Party Advisory | |
cve@mitre.org | https://bugs.openldap.org/show_bug.cgi?id=9428 | Issue Tracking, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/commit/9d0e8485f3113505743baabf1167e01e4558ccf5 | Patch, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20210226-0002/ | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212529 | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212530 | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212531 | Third Party Advisory | |
cve@mitre.org | https://www.debian.org/security/2021/dsa-4845 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/64 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/65 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/70 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.openldap.org/show_bug.cgi?id=9428 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/commit/9d0e8485f3113505743baabf1167e01e4558ccf5 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20210226-0002/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212529 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212530 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212531 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2021/dsa-4845 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
apple | macos | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "2192B6C0-FDC8-4609-B6C4-C78633717D07", "versionEndExcluding": "2.4.57", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "617E79BC-1012-4778-BDE7-44A238CC8D7A", "versionEndExcluding": "11.4", "versionStartIncluding": "11.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was discovered in OpenLDAP before 2.4.57 leading to an infinite loop in slapd with the cancel_extop Cancel operation, resulting in denial of service." }, { "lang": "es", "value": "Se detect\u00f3 un fallo en OpenLDAP versiones anteriores a 2.4.57, conllevando a un bucle infinito en slapd con la operaci\u00f3n Cancel de cancel_extop, resultando en una denegaci\u00f3n de servicio" } ], "id": "CVE-2020-36227", "lastModified": "2024-11-21T05:29:05.647", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-26T18:15:57.160", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9428" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/9d0e8485f3113505743baabf1167e01e4558ccf5" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212529" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212530" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212531" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9428" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/9d0e8485f3113505743baabf1167e01e4558ccf5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4845" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-835" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-07-26 13:15
Modified
2024-11-21 04:24
Severity ?
Summary
An issue was discovered in the server in OpenLDAP before 2.4.48. When the server administrator delegates rootDN (database admin) privileges for certain databases but wants to maintain isolation (e.g., for multi-tenant deployments), slapd does not properly stop a rootDN from requesting authorization as an identity from another database during a SASL bind or with a proxyAuthz (RFC 4370) control. (It is not a common configuration to deploy a system where the server administrator and a DB administrator enjoy different levels of trust.)
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://seclists.org/fulldisclosure/2019/Dec/26 | Mailing List, Third Party Advisory | |
cve@mitre.org | https://kc.mcafee.com/corporate/index?page=content&id=SB10365 | Third Party Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2019/08/msg00024.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://seclists.org/bugtraq/2019/Dec/23 | Mailing List, Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20190822-0004/ | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT210788 | Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/4078-1/ | Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/4078-2/ | Third Party Advisory | |
cve@mitre.org | https://www.openldap.org/its/?findid=9038 | Mailing List, Vendor Advisory | |
cve@mitre.org | https://www.openldap.org/lists/openldap-announce/201907/msg00001.html | Mailing List, Product, Vendor Advisory | |
cve@mitre.org | https://www.oracle.com/security-alerts/cpuapr2020.html | Patch, Third Party Advisory | |
cve@mitre.org | https://www.oracle.com/security-alerts/cpuapr2022.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2019/Dec/26 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://kc.mcafee.com/corporate/index?page=content&id=SB10365 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2019/08/msg00024.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2019/Dec/23 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20190822-0004/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT210788 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4078-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4078-2/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.openldap.org/its/?findid=9038 | Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.openldap.org/lists/openldap-announce/201907/msg00001.html | Mailing List, Product, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuapr2020.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuapr2022.html | Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 19.04 | |
debian | debian_linux | 8.0 | |
opensuse | leap | 15.0 | |
opensuse | leap | 15.1 | |
apple | mac_os_x | * | |
apple | mac_os_x | * | |
apple | mac_os_x | * | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
mcafee | policy_auditor | * | |
mcafee | policy_auditor | 6.5.1 | |
oracle | blockchain_platform | * | |
oracle | zfs_storage_appliance_kit | 8.8 | |
oracle | solaris | 11 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "57EFF643-7B40-4DF1-A75F-F53656B6A767", "versionEndExcluding": "2.4.48", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "760AE295-2E39-4DA3-A384-01A5D4A131AD", "versionEndExcluding": "10.13.6", "versionStartIncluding": "10.13", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DE2B03F-94EE-4E32-B366-FE31A7031403", "versionEndExcluding": "10.14.6", "versionStartIncluding": "10.14", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "2FA153AE-DA41-4A04-B1B1-328ACA29689B", "versionEndExcluding": "10.15.2", "versionStartIncluding": "10.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:-:*:*:*:*:*:*", "matchCriteriaId": "297D2D0C-EA9D-4B2C-9357-D88DB6C7143A", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-002:*:*:*:*:*:*", "matchCriteriaId": "0D845143-1B4D-478B-B83E-8F1664CBCAC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-003:*:*:*:*:*:*", "matchCriteriaId": "23C6DF6A-9A30-4F9E-BD9C-C19D8551C6DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-001:*:*:*:*:*:*", "matchCriteriaId": "754A2DF4-8724-4448-A2AB-AC5442029CB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-002:*:*:*:*:*:*", "matchCriteriaId": "D392C777-1949-4920-B459-D083228E4688", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-003:*:*:*:*:*:*", "matchCriteriaId": "68B0A232-F2A4-4B87-99EB-3A532DFA87DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-004:*:*:*:*:*:*", "matchCriteriaId": "0DF528F7-0F1E-4E55-A088-91327E3C360C", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-005:*:*:*:*:*:*", "matchCriteriaId": "E222445A-D398-47C8-9639-4BAE36B69AA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-006:*:*:*:*:*:*", "matchCriteriaId": "9425DAC8-038D-4B09-A074-3780AED912FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:*:*:*:*:*:*:*", "matchCriteriaId": "85D21088-00C3-401A-97EE-999424A39F0A", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*", "matchCriteriaId": "693E7DAE-BBF0-4D48-9F8A-20DDBD4AAC0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*", "matchCriteriaId": "CFE26ECC-A2C2-4501-9950-510DE0E1BD86", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB739B3A-20BB-4118-82DD-7ACFE5881FE2", "versionEndExcluding": "6.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mcafee:policy_auditor:6.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF442518-C7AE-4D88-AD33-8026FE382B34", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0DBC938-A782-433F-8BF1-CA250C332AA7", "versionEndExcluding": "21.1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*", "matchCriteriaId": "D3E503FB-6279-4D4A-91D8-E237ECF9D2B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*", "matchCriteriaId": "8E8C192B-8044-4BF9-9F1F-57371FC0E8FD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the server in OpenLDAP before 2.4.48. When the server administrator delegates rootDN (database admin) privileges for certain databases but wants to maintain isolation (e.g., for multi-tenant deployments), slapd does not properly stop a rootDN from requesting authorization as an identity from another database during a SASL bind or with a proxyAuthz (RFC 4370) control. (It is not a common configuration to deploy a system where the server administrator and a DB administrator enjoy different levels of trust.)" }, { "lang": "es", "value": "Se detect\u00f3 un problema en el servidor en OpenLDAP anterior a versi\u00f3n 2.4.48. Cuando el administrador del servidor delega los privilegios de tipo rootDN (administrador de base de datos) para ciertas bases de datos, pero quiere mantener el aislamiento (por ejemplo, para implementaciones de m\u00faltiples inquilinos), slapd no detiene apropiadamente un rootDN de solicitar una autorizaci\u00f3n como una identidad de otra base de datos durante un enlace SASL o con un control proxyAuthz (RFC 4370). (No es una configuraci\u00f3n com\u00fan implementar un sistema donde el administrador del servidor y el administrador de la base de datos disfruten de diferentes niveles de confianza)." } ], "id": "CVE-2019-13057", "lastModified": "2024-11-21T04:24:07.423", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-26T13:15:12.317", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2019/Dec/26" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00024.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190822-0004/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT210788" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4078-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4078-2/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://www.openldap.org/its/?findid=9038" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Product", "Vendor Advisory" ], "url": "https://www.openldap.org/lists/openldap-announce/201907/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2019/Dec/26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00024.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190822-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT210788" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4078-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4078-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://www.openldap.org/its/?findid=9038" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Product", "Vendor Advisory" ], "url": "https://www.openldap.org/lists/openldap-announce/201907/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-12-13 00:28
Modified
2025-04-09 00:30
Severity ?
Summary
Buffer overflow in the krbv4_ldap_auth function in servers/slapd/kerberos.c in OpenLDAP 2.4.3 and earlier, when OpenLDAP is compiled with the --enable-kbind (Kerberos KBIND) option, allows remote attackers to execute arbitrary code via an LDAP bind request using the LDAP_AUTH_KRBV41 authentication method and long credential data.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/23334 | ||
cve@mitre.org | http://securityreason.com/securityalert/2023 | ||
cve@mitre.org | http://www.phreedom.org/solar/exploits/openldap-kbind | Exploit | |
cve@mitre.org | http://www.securityfocus.com/archive/1/454181/30/0/threaded | Exploit, Vendor Advisory | |
cve@mitre.org | http://www.vupen.com/english/advisories/2006/4964 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/23334 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securityreason.com/securityalert/2023 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.phreedom.org/solar/exploits/openldap-kbind | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/454181/30/0/threaded | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2006/4964 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
openldap | openldap | 1.0 | |
openldap | openldap | 1.0.1 | |
openldap | openldap | 1.0.2 | |
openldap | openldap | 1.0.3 | |
openldap | openldap | 1.1 | |
openldap | openldap | 1.1.0 | |
openldap | openldap | 1.1.1 | |
openldap | openldap | 1.1.2 | |
openldap | openldap | 1.1.3 | |
openldap | openldap | 1.1.4 | |
openldap | openldap | 1.2 | |
openldap | openldap | 1.2.0 | |
openldap | openldap | 1.2.1 | |
openldap | openldap | 1.2.2 | |
openldap | openldap | 1.2.3 | |
openldap | openldap | 1.2.4 | |
openldap | openldap | 1.2.5 | |
openldap | openldap | 1.2.6 | |
openldap | openldap | 1.2.7 | |
openldap | openldap | 1.2.8 | |
openldap | openldap | 1.2.9 | |
openldap | openldap | 1.2.10 | |
openldap | openldap | 1.2.11 | |
openldap | openldap | 1.2.12 | |
openldap | openldap | 1.2.13 | |
openldap | openldap | 2.0 | |
openldap | openldap | 2.0.0 | |
openldap | openldap | 2.0.1 | |
openldap | openldap | 2.0.2 | |
openldap | openldap | 2.0.3 | |
openldap | openldap | 2.0.4 | |
openldap | openldap | 2.0.5 | |
openldap | openldap | 2.0.6 | |
openldap | openldap | 2.0.7 | |
openldap | openldap | 2.0.8 | |
openldap | openldap | 2.0.9 | |
openldap | openldap | 2.0.10 | |
openldap | openldap | 2.0.11 | |
openldap | openldap | 2.0.11_9 | |
openldap | openldap | 2.0.11_11 | |
openldap | openldap | 2.0.11_11s | |
openldap | openldap | 2.0.12 | |
openldap | openldap | 2.0.13 | |
openldap | openldap | 2.0.14 | |
openldap | openldap | 2.0.15 | |
openldap | openldap | 2.0.16 | |
openldap | openldap | 2.0.17 | |
openldap | openldap | 2.0.18 | |
openldap | openldap | 2.0.19 | |
openldap | openldap | 2.0.20 | |
openldap | openldap | 2.0.21 | |
openldap | openldap | 2.0.22 | |
openldap | openldap | 2.0.23 | |
openldap | openldap | 2.0.24 | |
openldap | openldap | 2.0.25 | |
openldap | openldap | 2.0.26 | |
openldap | openldap | 2.0.27 | |
openldap | openldap | 2.1.2 | |
openldap | openldap | 2.1.3 | |
openldap | openldap | 2.1.4 | |
openldap | openldap | 2.1.5 | |
openldap | openldap | 2.1.6 | |
openldap | openldap | 2.1.7 | |
openldap | openldap | 2.1.8 | |
openldap | openldap | 2.1.9 | |
openldap | openldap | 2.1.10 | |
openldap | openldap | 2.1.11 | |
openldap | openldap | 2.1.12 | |
openldap | openldap | 2.1.13 | |
openldap | openldap | 2.1.14 | |
openldap | openldap | 2.1.15 | |
openldap | openldap | 2.1.16 | |
openldap | openldap | 2.1.17 | |
openldap | openldap | 2.1.18 | |
openldap | openldap | 2.1.19 | |
openldap | openldap | 2.1.20 | |
openldap | openldap | 2.1.21 | |
openldap | openldap | 2.1.22 | |
openldap | openldap | 2.1.23 | |
openldap | openldap | 2.1.24 | |
openldap | openldap | 2.1.25 | |
openldap | openldap | 2.1.26 | |
openldap | openldap | 2.1.27 | |
openldap | openldap | 2.1.28 | |
openldap | openldap | 2.1.29 | |
openldap | openldap | 2.1.30 | |
openldap | openldap | 2.1_.20 | |
openldap | openldap | 2.2.0 | |
openldap | openldap | 2.2.1 | |
openldap | openldap | 2.2.4 | |
openldap | openldap | 2.2.5 | |
openldap | openldap | 2.2.6 | |
openldap | openldap | 2.2.7 | |
openldap | openldap | 2.2.8 | |
openldap | openldap | 2.2.9 | |
openldap | openldap | 2.2.10 | |
openldap | openldap | 2.2.11 | |
openldap | openldap | 2.2.12 | |
openldap | openldap | 2.2.13 | |
openldap | openldap | 2.2.14 | |
openldap | openldap | 2.2.15 | |
openldap | openldap | 2.2.16 | |
openldap | openldap | 2.2.17 | |
openldap | openldap | 2.2.18 | |
openldap | openldap | 2.2.19 | |
openldap | openldap | 2.2.20 | |
openldap | openldap | 2.2.21 | |
openldap | openldap | 2.2.22 | |
openldap | openldap | 2.2.23 | |
openldap | openldap | 2.2.24 | |
openldap | openldap | 2.2.25 | |
openldap | openldap | 2.2.26 | |
openldap | openldap | 2.2.27 | |
openldap | openldap | 2.2.28_r2 | |
openldap | openldap | 2.3.27_2_2006-10-18 | |
openldap | openldap | 2.3.28_2_2006-10-22 | |
openldap | openldap | 2.3.28_2006-10-22 | |
openldap | openldap | 2.3.28_e1.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "8472BB1A-09FB-450F-AF7B-FB2CEE04011E", "versionEndIncluding": "2.4.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "086DC60F-F530-4515-8F3D-87F30DB9B322", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D538927-82D5-476E-9C85-2E9297316D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "2A904832-A6D6-45D4-B07C-79ED1FE47A80", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BB554A4-EEC2-4E17-9F32-27A580B9E389", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "191DB249-6A73-4561-8CCA-565D1525CB31", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "423F9D3A-6AA7-4D64-B872-2C867EEFC3DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "34A5D9A5-FB1D-4ACF-846A-4DB73196122C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "41400CE6-FA51-435C-93F7-B31FE42F18AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "6022ABEB-6825-4A5F-9884-74F94C2387F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "D2F15789-334D-460D-B5B3-FCC71087D107", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F77B1548-BB6D-4618-AE7B-E97F91A0AF5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1CC52235-72DA-4EF4-870A-AF25181DB56C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "B7064C52-1211-42B8-BF1F-C22D800AED07", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1CD95826-E44A-48C6-BAAB-77A905CAE6B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "FEEA6BB6-41FC-4F15-A95F-9B052F062454", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "E90766C1-6DBD-435C-85E1-920DAFA26D67", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "8CD13DAE-9588-4540-9183-FB80C507F985", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "526366F3-52F0-4816-A356-8F39B718C048", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "AC07AD0D-5DF9-41A4-8592-CEFF1842355D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "30017C56-42A9-4AF9-B5B3-7357E424F837", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "C8A51F38-3F5A-4F6D-93EE-776B5C2FF48F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "8DBEC27E-3220-42CE-B6CC-675F387CB506", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "E641DFFB-CBAF-4DCF-944F-443CFF836A53", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "A552E270-5C9C-40DC-B23D-97C8D995B8FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "53DF812C-E1F8-46D3-A072-3FBE696ADC33", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "552F2E25-DDB8-49A6-844A-8520696DBE5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "149EBFB7-B58F-4557-8E46-6DF88BB5E57E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "03D75A36-41C4-464F-8DC4-42C841ABC087", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C3EE919-D05C-4625-85FE-132F6F2B932C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "20D99A58-8D7E-4586-A9BF-1DD2A1DBB8D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DEBA0118-545E-4D7B-B819-34D157B2BA6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "67826609-F4CA-42CB-A5D0-B4503DDE2C92", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "61676BBD-95B8-44C9-BD66-79F00381BF86", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "719A9B1D-8E32-461F-BCD4-F72C6AD3E63E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "BFD73969-39F8-4849-AF6A-15ACDC2E4537", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DB8C1DD2-865A-4CF2-8137-3C40C01C9EAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "EE38B045-2224-43D1-8618-0885505865C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "5D26DAC5-EDBD-42D8-A877-1E6EA666D72B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.11_9:*:*:*:*:*:*:*", "matchCriteriaId": "E7AE325E-514C-40A1-AA56-D605377B5D90", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.11_11:*:*:*:*:*:*:*", "matchCriteriaId": "19397A11-E549-4F31-8007-8D5F3C0AABB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.11_11s:*:*:*:*:*:*:*", "matchCriteriaId": "1C659213-271D-4F22-AE14-A1646A612D2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67B0A2B6-C560-4AE0-BC79-3C7BC9163EE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "566406CE-368A-4799-A112-E5DFC5B333D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "E5CCC734-C15B-4D2B-BF83-F214F807C44E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "64796893-A90D-4B7D-BDBC-0087B57AF7E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "39914C6A-F4DB-43CC-B2B6-097365E55D34", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "5BFDD8F7-AAFD-453F-99A4-F9C0424EA791", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "0BFEEAA6-0B50-4644-A183-F5FEE7BD7EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "920FC1DB-95E2-4367-BF20-77D75BD7617D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "28E643F8-005A-4170-8275-8E4AB5C25209", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "C8A34C63-C17D-4026-B409-AA9A56529B87", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "4EA863B0-A6AB-44BD-84E8-B6C885EFFE10", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "24BFAEC7-6256-4B8F-83F5-60FBD1571936", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "83227371-ACC3-4217-BFF9-0A3AAADD50DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "734B8101-BEAC-40AB-81EA-2516CA20BC93", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "F0BD5253-FBC9-4384-8FC3-4E384582BE91", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "AA73658A-8834-4EC2-8D8F-3A7D1C834669", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "06BCE98E-546C-4852-BAE2-CF525A778B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "94284C78-255E-43B7-A33E-FBC25BABEA2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "4B298BAA-5584-4193-A3DB-31FBB0BD12B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "90604A40-A1F5-4F23-9B8C-472E8C794B59", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "1418EC80-2F42-4C1B-BA38-CA5BDEF83F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "9BC65FE9-348D-4468-A1EF-2AC5C673DB07", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "B3A400A0-B9D7-4CB2-82EA-49A599C2B30B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "65587514-46AB-4D70-B7C2-FBED7F78D13D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "7951BAAB-CB06-4F19-891A-E07E2B3C8701", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "82EC30A1-4150-44DC-89F7-5A64B8CC4A84", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "9DF04D97-A561-427B-9891-A1423B86F164", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "1E74B0C8-2D64-4BF2-B152-87909E3029EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "88F6CA0B-ED91-4085-8EE0-1F4256747621", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "B90657E7-D651-4E1E-8035-13A1F024E3C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "7BBE5477-BE27-412A-9BA9-9690F746B4F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "31300FA3-C57D-4564-927E-B06C0229BE8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "342E414D-8ED6-4E5A-88F0-57B5846A3EB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7C0BD0FD-BD80-4197-8479-BBB070DAB890", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "FC9CA4EF-61F1-407B-B2BF-B4AFD68F50BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "EB80C814-5B28-46CC-8237-70A558BF049C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "832AC063-6004-4A78-A964-45906361F9C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "E7C40DFD-4FB8-40AA-ABA4-194DED1241A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "992733F2-000F-4E27-8D19-AF18543E57BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "B36E0E49-D908-4A19-A621-6E7FB3E59A18", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "74779CA2-6741-4053-8C23-98A1F938B264", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "930DAA18-113F-42B0-8382-8579575D238F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "98F50353-EBFB-4DE5-8D35-80C672A12E41", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "18A4F43F-8E4F-4203-B640-02BBB28052A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "28063C54-EE5E-44EC-8D47-E880C2BB45BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1_.20:*:*:*:*:*:*:*", "matchCriteriaId": "E8BCFC49-6505-4713-A06C-A64782A34414", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BAE01BA8-416B-4419-99E5-81C1FA404FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C2F45B8-B9FB-4D43-B2DD-98413F5F2B85", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "0F611094-500A-4306-8C15-4878135FA45D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "32096DE5-3F2C-4FF7-BDC6-E316DFDC97A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FE197F27-CB34-4B0E-A30A-C9C87295AAD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "10A4256F-EC89-425F-86FD-B0DE243EBF2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "4A34127E-507D-4F72-9F93-B23F91DB0F53", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "B7A2D5D9-3E7E-4420-A338-B05A8C077229", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "C76EF100-3328-4C70-A123-50A4ECFF539E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "1DCE7803-E652-4A17-8EEB-B91C81CF48E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "DA5CB439-5F0B-40CF-8564-6875CAC74FCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB5E524E-1B71-46B5-A14E-C2342851C0FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "FE103338-9AE7-4230-A8B2-09273004B4D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "12621DED-ABF1-47A7-961C-E6DE1F6302AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "C8026929-4845-46E4-A6F8-E60CA498201B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "DE01BD68-D6DC-4220-A3F0-71961CEA205F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "68DE3F16-E171-4FA3-9B00-3F944A4E7604", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "63F7B718-0E5C-4900-A5DE-D59D37EC79D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "8B8805A0-F543-450D-82E9-EE923904E2A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.21:*:*:*:*:*:*:*", "matchCriteriaId": "58779045-578C-41D5-9CAE-D6F48C91654C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "969F18EF-067A-47BA-9DC4-9FA69D9DCBB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.23:*:*:*:*:*:*:*", "matchCriteriaId": "E12766AB-2AFE-4BBD-8B80-8BEA932ABDFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.24:*:*:*:*:*:*:*", "matchCriteriaId": "6C2C7514-8BB4-4B8A-A5AF-D4A26B232597", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.25:*:*:*:*:*:*:*", "matchCriteriaId": "64C0AB94-ED91-4218-8F97-862BA57D1CC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.26:*:*:*:*:*:*:*", "matchCriteriaId": "E2FF5C05-0A64-416C-8346-EE5FF4AA14F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.27:*:*:*:*:*:*:*", "matchCriteriaId": "5C081128-2846-4257-B822-10AADE54899D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.28_r2:*:*:*:*:*:*:*", "matchCriteriaId": "45FF1704-80C6-439E-B145-7F5B14B62E46", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.27_2_2006-10-18:*:*:*:*:*:*:*", "matchCriteriaId": "2D72D166-BBF2-439E-BBBB-E7BCF330B671", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.28_2_2006-10-22:*:*:*:*:*:*:*", "matchCriteriaId": "1AB064D8-04E6-4F90-917C-ACE6B59820BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.28_2006-10-22:*:*:*:*:*:*:*", "matchCriteriaId": "9DA306AE-307F-4AF3-8AEA-FAB7F82DBB90", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.28_e1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "86033CDB-D9A3-4872-9FF7-789F2332923B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the krbv4_ldap_auth function in servers/slapd/kerberos.c in OpenLDAP 2.4.3 and earlier, when OpenLDAP is compiled with the --enable-kbind (Kerberos KBIND) option, allows remote attackers to execute arbitrary code via an LDAP bind request using the LDAP_AUTH_KRBV41 authentication method and long credential data." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en la funci\u00f3n krbv4_ldap_auth de servers/slapd/kerberos.c en OpenLDAP 2.4.3 y versiones anteriores, cuando el OpenLDAP es compilado con la opci\u00f3n kbind (Kerberos KBIND) habilitada, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una petici\u00f3n LDAP utilizando el m\u00e9todo de autenticaci\u00f3n LDAP_AUTH_KRBV41 y un dato largo en las credenciales." } ], "evaluatorSolution": "Successful exploitation requires that OpenLDAP allows the use of the LDAPv2 protocol, and is compiled with the --enable-kbind (Kerberos KBIND) option which has been disabled by default since version 2.0.2 and was removed from the configure script in the 2.1 release.", "id": "CVE-2006-6493", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-12-13T00:28:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/23334" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/2023" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.phreedom.org/solar/exploits/openldap-kbind" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/454181/30/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/4964" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/23334" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/2023" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.phreedom.org/solar/exploits/openldap-kbind" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/454181/30/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/4964" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Not vulnerable. OpenLDAP as shipped with Red Hat Enterprise Linux 2.1, 3, and 4 does not support the LDAP_AUTH_KRBV41 authentication method.", "lastModified": "2006-12-19T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-12-08 01:15
Modified
2024-11-21 05:18
Severity ?
Summary
A NULL pointer dereference was found in OpenLDAP server and was fixed in openldap 2.4.55, during a request for renaming RDNs. An unauthenticated attacker could remotely crash the slapd process by sending a specially crafted request, causing a Denial of Service.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1894567 | Issue Tracking, Patch, Third Party Advisory | |
secalert@redhat.com | https://security.netapp.com/advisory/ntap-20210108-0006/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1894567 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20210108-0006/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
redhat | enterprise_linux | 5.0 | |
redhat | enterprise_linux | 6.0 | |
redhat | enterprise_linux | 7.0 | |
netapp | cloud_backup | - | |
netapp | solidfire_baseboard_management_controller_firmware | - | |
netapp | solidfire_baseboard_management_controller | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "72DCC8FC-D366-40BD-B0B9-835D2F0C9C34", "versionEndExcluding": "2.4.55", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "1D8B549B-E57B-4DFE-8A13-CAB06B5356B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB9B8171-F6CA-427D-81E0-6536D3BBFA8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "090AA6F4-4404-4E26-82AB-C3A22636F276", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A NULL pointer dereference was found in OpenLDAP server and was fixed in openldap 2.4.55, during a request for renaming RDNs. An unauthenticated attacker could remotely crash the slapd process by sending a specially crafted request, causing a Denial of Service." }, { "lang": "es", "value": "Se encontr\u00f3 una desreferencia de puntero NULL en el servidor OpenLDAP y se corrigi\u00f3 en openldap versi\u00f3n 2.4.55, durante una petici\u00f3n para cambiar el nombre de los RDN. Un atacante no autenticado podr\u00eda bloquear remotamente el proceso slapd al enviar una petici\u00f3n especialmente dise\u00f1ada, causando una Denegaci\u00f3n de Servicio" } ], "id": "CVE-2020-25692", "lastModified": "2024-11-21T05:18:29.210", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-12-08T01:15:12.133", "references": [ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894567" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210108-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894567" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210108-0006/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "secalert@redhat.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2000-04-21 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Linux OpenLDAP server allows local users to modify arbitrary files via a symlink attack.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-2000-009.0.txt | Patch, Vendor Advisory | |
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2000-012.html | ||
cve@mitre.org | http://www.securityfocus.com/bid/1232 | ||
cve@mitre.org | http://www.turbolinux.com/pipermail/tl-security-announce/2000-May/000009.html | ||
af854a3a-2127-422b-91ae-364da2661108 | ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-2000-009.0.txt | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2000-012.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/1232 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.turbolinux.com/pipermail/tl-security-announce/2000-May/000009.html |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | 1.2.7 | |
openldap | openldap | 1.2.8 | |
openldap | openldap | 1.2.9 | |
openldap | openldap | 1.2.10 | |
mandrakesoft | mandrake_linux | 6.1 | |
mandrakesoft | mandrake_linux | 7.0 | |
redhat | linux | 6.1 | |
redhat | linux | 6.1 | |
redhat | linux | 6.1 | |
redhat | linux | 6.2 | |
redhat | linux | 6.2 | |
redhat | linux | 6.2 | |
turbolinux | turbolinux | 4.2 | |
turbolinux | turbolinux | 4.4 | |
turbolinux | turbolinux | 6.0.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "AC07AD0D-5DF9-41A4-8592-CEFF1842355D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "30017C56-42A9-4AF9-B5B3-7357E424F837", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "C8A51F38-3F5A-4F6D-93EE-776B5C2FF48F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "8DBEC27E-3220-42CE-B6CC-675F387CB506", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACAAD334-2CA7-4B3B-BA25-302E7610BC2A", "vulnerable": true }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "E4853E92-5E0A-47B9-A343-D5BEE87D2C27", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux:6.1:*:alpha:*:*:*:*:*", "matchCriteriaId": "C89454B9-4F45-4A42-A06D-ED42D893C544", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux:6.1:*:i386:*:*:*:*:*", "matchCriteriaId": "B72D6205-DFA4-41D9-B3B6-0B7DA756CD8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux:6.1:*:sparc:*:*:*:*:*", "matchCriteriaId": "1E64093E-7D53-4238-95C3-48ED5A0FFD97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*", "matchCriteriaId": "344610A8-DB6D-4407-9304-916C419F648C", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*", "matchCriteriaId": "B7EC2B95-4715-4EC9-A10A-2542501F8A61", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:*", "matchCriteriaId": "64775BEF-2E53-43CA-8639-A7E54F6F4222", "vulnerable": true }, { "criteria": "cpe:2.3:o:turbolinux:turbolinux:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "5D15A193-3E01-467C-AEAD-497F4600DB06", "vulnerable": true }, { "criteria": "cpe:2.3:o:turbolinux:turbolinux:4.4:*:*:*:*:*:*:*", "matchCriteriaId": "F7C765FF-0A3D-4BF4-B236-609658776ACA", "vulnerable": true }, { "criteria": "cpe:2.3:o:turbolinux:turbolinux:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "C6619B49-8A89-4600-A47F-A39C8BF54259", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Linux OpenLDAP server allows local users to modify arbitrary files via a symlink attack." } ], "id": "CVE-2000-0336", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-04-21T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-2000-009.0.txt" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2000-012.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/1232" }, { "source": "cve@mitre.org", "url": "http://www.turbolinux.com/pipermail/tl-security-announce/2000-May/000009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-2000-009.0.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2000-012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/1232" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.turbolinux.com/pipermail/tl-security-announce/2000-May/000009.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-07-01 21:41
Modified
2025-04-09 00:30
Severity ?
Summary
liblber/io.c in OpenLDAP 2.2.4 to 2.4.10 allows remote attackers to cause a denial of service (program termination) via crafted ASN.1 BER datagrams that trigger an assertion error.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html | ||
cve@mitre.org | http://secunia.com/advisories/30853 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/30917 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/30996 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/31326 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/31364 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/31436 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/32254 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/32316 | Vendor Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200808-09.xml | ||
cve@mitre.org | http://wiki.rpath.com/Advisories:rPSA-2008-0249 | ||
cve@mitre.org | http://www.debian.org/security/2008/dsa-1650 | ||
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2008:144 | ||
cve@mitre.org | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5580 | ||
cve@mitre.org | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5580%3Bselectid=5580 | ||
cve@mitre.org | http://www.openwall.com/lists/oss-security/2008/07/01/2 | ||
cve@mitre.org | http://www.openwall.com/lists/oss-security/2008/07/13/2 | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2008-0583.html | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/495320/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/30013 | ||
cve@mitre.org | http://www.securitytracker.com/id?1020405 | ||
cve@mitre.org | http://www.ubuntu.com/usn/usn-634-1 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2008/1978/references | Vendor Advisory | |
cve@mitre.org | http://www.vupen.com/english/advisories/2008/2268 | Vendor Advisory | |
cve@mitre.org | http://www.zerodayinitiative.com/advisories/ZDI-08-052/ | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/43515 | ||
cve@mitre.org | https://issues.rpath.com/browse/RPL-2645 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10662 | ||
cve@mitre.org | https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00109.html | ||
cve@mitre.org | https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00129.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30853 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30917 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30996 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31326 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31364 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31436 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/32254 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/32316 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200808-09.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://wiki.rpath.com/Advisories:rPSA-2008-0249 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2008/dsa-1650 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2008:144 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5580 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5580%3Bselectid=5580 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2008/07/01/2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2008/07/13/2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0583.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/495320/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/30013 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020405 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-634-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1978/references | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2268 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.zerodayinitiative.com/advisories/ZDI-08-052/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/43515 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://issues.rpath.com/browse/RPL-2645 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10662 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00109.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00129.html |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | 2.2.4 | |
openldap | openldap | 2.2.5 | |
openldap | openldap | 2.2.6 | |
openldap | openldap | 2.2.7 | |
openldap | openldap | 2.2.8 | |
openldap | openldap | 2.2.9 | |
openldap | openldap | 2.3.4 | |
openldap | openldap | 2.3.5 | |
openldap | openldap | 2.3.6 | |
openldap | openldap | 2.3.7 | |
openldap | openldap | 2.3.8 | |
openldap | openldap | 2.3.9 | |
openldap | openldap | 2.3.10 | |
openldap | openldap | 2.3.11 | |
openldap | openldap | 2.3.12 | |
openldap | openldap | 2.3.13 | |
openldap | openldap | 2.3.14 | |
openldap | openldap | 2.3.15 | |
openldap | openldap | 2.3.16 | |
openldap | openldap | 2.3.17 | |
openldap | openldap | 2.3.18 | |
openldap | openldap | 2.3.19 | |
openldap | openldap | 2.3.20 | |
openldap | openldap | 2.3.21 | |
openldap | openldap | 2.3.22 | |
openldap | openldap | 2.3.23 | |
openldap | openldap | 2.3.24 | |
openldap | openldap | 2.3.25 | |
openldap | openldap | 2.3.26 | |
openldap | openldap | 2.3.27 | |
openldap | openldap | 2.3.28 | |
openldap | openldap | 2.3.29 | |
openldap | openldap | 2.3.30 | |
openldap | openldap | 2.3.31 | |
openldap | openldap | 2.3.32 | |
openldap | openldap | 2.3.33 | |
openldap | openldap | 2.3.34 | |
openldap | openldap | 2.3.35 | |
openldap | openldap | 2.3.36 | |
openldap | openldap | 2.3.37 | |
openldap | openldap | 2.3.38 | |
openldap | openldap | 2.3.39 | |
openldap | openldap | 2.3.40 | |
openldap | openldap | 2.3.41 | |
openldap | openldap | 2.3.42 | |
openldap | openldap | 2.3.43 | |
openldap | openldap | 2.4.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "0F611094-500A-4306-8C15-4878135FA45D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "32096DE5-3F2C-4FF7-BDC6-E316DFDC97A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FE197F27-CB34-4B0E-A30A-C9C87295AAD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "10A4256F-EC89-425F-86FD-B0DE243EBF2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "4A34127E-507D-4F72-9F93-B23F91DB0F53", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "B7A2D5D9-3E7E-4420-A338-B05A8C077229", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D9090B1B-0724-4526-A40D-47044401B6EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "A5E5AC6E-F43B-404D-BA46-2F4412456ACB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "61AE77E5-6595-45A4-A233-C36B97F551B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "80224FC0-7DF5-4815-9D3D-63AC462119FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "F821D76D-1592-478B-AE7B-D16B22837C74", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "67146520-86CF-4EF6-88AC-22E2D167D686", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "2E8C5E2D-52FD-448B-9423-9F51349BEE4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "FCC99DDD-EF08-45B7-8369-1D52A03D6E58", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "C79D5E35-1F96-4AF5-B89A-A8FCD33D1FDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "B93B4C9A-5C0E-4226-9975-E26330A287A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "0F305125-0477-4C8F-9C94-39EB623E1A35", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "BF72A8C3-6DB5-494A-843F-D3CF57AAFDAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "45104882-4F43-4437-8B2E-2F6E97952C22", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.17:*:*:*:*:*:*:*", "matchCriteriaId": "2C2BDB6E-B620-4707-A2C4-0AC3E6536B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.18:*:*:*:*:*:*:*", "matchCriteriaId": "BC84EA72-7B34-454D-B46D-616596AF41B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.19:*:*:*:*:*:*:*", "matchCriteriaId": "4EE3F254-C565-4650-B875-116FD2C29867", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.20:*:*:*:*:*:*:*", "matchCriteriaId": "49B31BEE-944F-40FA-A173-EF55C2232834", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.21:*:*:*:*:*:*:*", "matchCriteriaId": "003A1BF0-1C40-4A5B-A724-25692199D2C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.22:*:*:*:*:*:*:*", "matchCriteriaId": "9D0298B8-44F5-4375-BBB4-107B1A9D1E17", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.23:*:*:*:*:*:*:*", "matchCriteriaId": "E94E748F-3367-4432-AA85-61767541A377", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.24:*:*:*:*:*:*:*", "matchCriteriaId": "E628F5CE-4D21-43D4-8789-99B32FA28A0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.25:*:*:*:*:*:*:*", "matchCriteriaId": "A4ECDC15-67A3-4432-B141-8EC38C440D6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.26:*:*:*:*:*:*:*", "matchCriteriaId": "BA382EA1-9ED6-4E10-89E7-3DD3A1FE7BBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.27:*:*:*:*:*:*:*", "matchCriteriaId": "6DCE01E9-3D72-433F-A600-B7359C1197FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.28:*:*:*:*:*:*:*", "matchCriteriaId": "75371593-00F5-4F49-B0EC-7835CB1DB97F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.29:*:*:*:*:*:*:*", "matchCriteriaId": "F45E2CED-46CA-4F85-AA38-DCA5141CCFFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.30:*:*:*:*:*:*:*", "matchCriteriaId": "9A1CDD24-F8E3-4C39-BD39-36ADEC814C41", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.31:*:*:*:*:*:*:*", "matchCriteriaId": "64E00372-FD22-45E5-8815-9B0826BE7857", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.32:*:*:*:*:*:*:*", "matchCriteriaId": "4C6B5E35-7109-4FE0-8E34-61C5CA0C5D05", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.33:*:*:*:*:*:*:*", "matchCriteriaId": "5C41A0F2-DBB7-48B6-AF89-7963CED8D196", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.34:*:*:*:*:*:*:*", "matchCriteriaId": "7B0A12F9-7DEA-4E3F-A3A8-3C9E782AC4BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.35:*:*:*:*:*:*:*", "matchCriteriaId": "06223A03-1598-4D0F-B0F6-576AA3CB1E96", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.36:*:*:*:*:*:*:*", "matchCriteriaId": "87155B64-0AE1-4418-8866-84CEA879665B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.37:*:*:*:*:*:*:*", "matchCriteriaId": "A563D3EA-7DE0-4DE7-AD64-8724B6E72A6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.38:*:*:*:*:*:*:*", "matchCriteriaId": "7AF66FA9-EE80-48DD-B10E-8D047CF4BC22", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.39:*:*:*:*:*:*:*", "matchCriteriaId": "1F11D98D-F23D-45B4-9733-B3C0C781ADCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.40:*:*:*:*:*:*:*", "matchCriteriaId": "2EFE64A8-3B40-44C9-983F-8F3BDC9879E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.41:*:*:*:*:*:*:*", "matchCriteriaId": "C51880E8-AA9E-43AD-BDC3-3DA530823AAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.42:*:*:*:*:*:*:*", "matchCriteriaId": "D58AC865-207C-4612-B112-AE430BB76213", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.43:*:*:*:*:*:*:*", "matchCriteriaId": "EF350C0B-E6BF-4626-BA1D-DED83358D86A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "473AEC48-FBBF-4BEB-8728-1FA80DD94807", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "liblber/io.c in OpenLDAP 2.2.4 to 2.4.10 allows remote attackers to cause a denial of service (program termination) via crafted ASN.1 BER datagrams that trigger an assertion error." }, { "lang": "es", "value": "El archivo liblber/io.c en OpenLDAP versiones 2.2.4 hasta 2.4.10, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (finalizaci\u00f3n del programa) por medio de datagramas ASN.1 BER dise\u00f1ados que desencadenan un error de aserci\u00f3n." } ], "id": "CVE-2008-2952", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-07-01T21:41:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30853" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30917" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30996" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31326" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31364" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31436" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32254" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32316" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200808-09.xml" }, { "source": "cve@mitre.org", "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0249" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2008/dsa-1650" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:144" }, { "source": "cve@mitre.org", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5580" }, { "source": "cve@mitre.org", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5580%3Bselectid=5580" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2008/07/01/2" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2008/07/13/2" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2008-0583.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/495320/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/30013" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1020405" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/usn-634-1" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/1978/references" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/2268" }, { "source": "cve@mitre.org", "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-052/" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43515" }, { "source": "cve@mitre.org", "url": "https://issues.rpath.com/browse/RPL-2645" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10662" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00109.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00129.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30853" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30996" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31326" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31364" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31436" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32254" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200808-09.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0249" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2008/dsa-1650" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:144" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5580" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5580%3Bselectid=5580" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2008/07/01/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2008/07/13/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0583.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/495320/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/30013" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1020405" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-634-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/1978/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/2268" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-052/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43515" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.rpath.com/browse/RPL-2645" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10662" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00109.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00129.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-07-26 13:15
Modified
2024-11-21 04:25
Severity ?
Summary
An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://seclists.org/fulldisclosure/2019/Dec/26 | Mailing List, Third Party Advisory | |
cve@mitre.org | https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2019/08/msg00024.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://seclists.org/bugtraq/2019/Dec/23 | Mailing List, Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT210788 | Third Party Advisory | |
cve@mitre.org | https://support.f5.com/csp/article/K98008862?utm_source=f5support&%3Butm_medium=RSS | ||
cve@mitre.org | https://usn.ubuntu.com/4078-1/ | Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/4078-2/ | Third Party Advisory | |
cve@mitre.org | https://www.openldap.org/its/index.cgi/?findid=9052 | Mailing List, Vendor Advisory | |
cve@mitre.org | https://www.openldap.org/lists/openldap-announce/201907/msg00001.html | Mailing List, Vendor Advisory | |
cve@mitre.org | https://www.oracle.com/security-alerts/cpuapr2020.html | Patch, Third Party Advisory | |
cve@mitre.org | https://www.oracle.com/security-alerts/cpuapr2022.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2019/Dec/26 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2019/08/msg00024.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2019/Dec/23 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT210788 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K98008862?utm_source=f5support&%3Butm_medium=RSS | ||
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4078-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4078-2/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.openldap.org/its/index.cgi/?findid=9052 | Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.openldap.org/lists/openldap-announce/201907/msg00001.html | Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuapr2020.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuapr2022.html | Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 19.04 | |
debian | debian_linux | 8.0 | |
opensuse | leap | 15.0 | |
opensuse | leap | 15.1 | |
f5 | traffix_signaling_delivery_controller | 5.0.0 | |
f5 | traffix_signaling_delivery_controller | 5.1.0 | |
apple | mac_os_x | * | |
apple | mac_os_x | * | |
apple | mac_os_x | * | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
oracle | blockchain_platform | * | |
oracle | zfs_storage_appliance_kit | 8.8 | |
oracle | solaris | 11 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3906A1D-2621-411B-A0C7-712212F1995A", "versionEndIncluding": "2.4.47", "versionStartIncluding": "2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:*:*:*:*", "matchCriteriaId": "B85E9B9B-ADDB-4D2F-A857-685BD30CE856", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:traffix_signaling_delivery_controller:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "BD2438E2-0693-45E0-998E-0E9010525E9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:traffix_signaling_delivery_controller:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "42836A1C-81BB-4F80-9E32-EEE0DAA18D26", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "760AE295-2E39-4DA3-A384-01A5D4A131AD", "versionEndExcluding": "10.13.6", "versionStartIncluding": "10.13", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DE2B03F-94EE-4E32-B366-FE31A7031403", "versionEndExcluding": "10.14.6", "versionStartIncluding": "10.14", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "2FA153AE-DA41-4A04-B1B1-328ACA29689B", "versionEndExcluding": "10.15.2", "versionStartIncluding": "10.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:*:*:*:*:*:*:*", "matchCriteriaId": "04D7DAFB-DEE4-4A71-A27C-0E34426AACE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:-:*:*:*:*:*:*", "matchCriteriaId": "297D2D0C-EA9D-4B2C-9357-D88DB6C7143A", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-002:*:*:*:*:*:*", "matchCriteriaId": "0D845143-1B4D-478B-B83E-8F1664CBCAC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-003:*:*:*:*:*:*", "matchCriteriaId": "23C6DF6A-9A30-4F9E-BD9C-C19D8551C6DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-001:*:*:*:*:*:*", "matchCriteriaId": "754A2DF4-8724-4448-A2AB-AC5442029CB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-002:*:*:*:*:*:*", "matchCriteriaId": "D392C777-1949-4920-B459-D083228E4688", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-003:*:*:*:*:*:*", "matchCriteriaId": "68B0A232-F2A4-4B87-99EB-3A532DFA87DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-004:*:*:*:*:*:*", "matchCriteriaId": "0DF528F7-0F1E-4E55-A088-91327E3C360C", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-005:*:*:*:*:*:*", "matchCriteriaId": "E222445A-D398-47C8-9639-4BAE36B69AA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-006:*:*:*:*:*:*", "matchCriteriaId": "9425DAC8-038D-4B09-A074-3780AED912FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*", "matchCriteriaId": "693E7DAE-BBF0-4D48-9F8A-20DDBD4AAC0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*", "matchCriteriaId": "CFE26ECC-A2C2-4501-9950-510DE0E1BD86", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0DBC938-A782-433F-8BF1-CA250C332AA7", "versionEndExcluding": "21.1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*", "matchCriteriaId": "D3E503FB-6279-4D4A-91D8-E237ECF9D2B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*", "matchCriteriaId": "8E8C192B-8044-4BF9-9F1F-57371FC0E8FD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user." }, { "lang": "es", "value": "Se detect\u00f3 un problema en OpenLDAP versiones 2.x anteriores a 2.4.48. Cuando se utiliza la autenticaci\u00f3n SASL y el cifrado de sesi\u00f3n y confiando en las capas de seguridad SASL en los controles de acceso slapd, es posible obtener acceso que, de lo contrario, se denegar\u00eda por medio de un enlace simple para cualquier identidad cubierta en esas ACL. Una vez completado el primer enlace SASL, se conserva el valor sasl_ssf para todas las nuevas conexiones que no sean SASL. Dependiendo de la configuraci\u00f3n de ACL, esto puede afectar a diferentes tipos de operaciones (b\u00fasquedas, modificaciones, etc.). En otras palabras, un paso de autorizaci\u00f3n completado con \u00e9xito por un usuario afecta al requisito de autorizaci\u00f3n para un usuario diferente." } ], "id": "CVE-2019-13565", "lastModified": "2024-11-21T04:25:11.190", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-26T13:15:12.720", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2019/Dec/26" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00024.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT210788" }, { "source": "cve@mitre.org", "url": "https://support.f5.com/csp/article/K98008862?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4078-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4078-2/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://www.openldap.org/its/index.cgi/?findid=9052" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://www.openldap.org/lists/openldap-announce/201907/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2019/Dec/26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00024.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT210788" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.f5.com/csp/article/K98008862?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4078-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4078-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://www.openldap.org/its/index.cgi/?findid=9052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://www.openldap.org/lists/openldap-announce/201907/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-06-30 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://archives.neohapsis.com/archives/fulldisclosure/2005-07/0060.html | Broken Link | |
secalert@redhat.com | http://bugs.gentoo.org/show_bug.cgi?id=96767 | Third Party Advisory | |
secalert@redhat.com | http://bugzilla.padl.com/show_bug.cgi?id=210 | Issue Tracking, Patch, Vendor Advisory | |
secalert@redhat.com | http://bugzilla.padl.com/show_bug.cgi?id=211 | Issue Tracking, Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/17233 | Third Party Advisory | |
secalert@redhat.com | http://secunia.com/advisories/17845 | Third Party Advisory | |
secalert@redhat.com | http://secunia.com/advisories/21520 | Third Party Advisory | |
secalert@redhat.com | http://support.avaya.com/elmodocs2/security/ASA-2006-157.htm | Third Party Advisory | |
secalert@redhat.com | http://www.gentoo.org/security/en/glsa/glsa-200507-13.xml | Third Party Advisory | |
secalert@redhat.com | http://www.openldap.org/its/index.cgi/Incoming?id=3791 | Patch, Vendor Advisory | |
secalert@redhat.com | http://www.osvdb.org/17692 | Broken Link | |
secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2005-751.html | Third Party Advisory | |
secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2005-767.html | Third Party Advisory | |
secalert@redhat.com | http://www.securityfocus.com/bid/14125 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.securityfocus.com/bid/14126 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.ubuntu.com/usn/usn-152-1 | Third Party Advisory | |
secalert@redhat.com | http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:121 | Third Party Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=161990 | Issue Tracking, Third Party Advisory | |
secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/21245 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9445 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/fulldisclosure/2005-07/0060.html | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://bugs.gentoo.org/show_bug.cgi?id=96767 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://bugzilla.padl.com/show_bug.cgi?id=210 | Issue Tracking, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://bugzilla.padl.com/show_bug.cgi?id=211 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/17233 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/17845 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21520 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.avaya.com/elmodocs2/security/ASA-2006-157.htm | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.gentoo.org/security/en/glsa/glsa-200507-13.xml | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/its/index.cgi/Incoming?id=3791 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/17692 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2005-751.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2005-767.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/14125 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/14126 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-152-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:121 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=161990 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/21245 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9445 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:padl:nss_ldap:-:*:*:*:*:*:*:*", "matchCriteriaId": "558C8B99-55C2-42AE-9959-07A6944DA926", "vulnerable": true }, { "criteria": "cpe:2.3:a:padl:pam_ldap:-:*:*:*:*:*:*:*", "matchCriteriaId": "21C67252-5F59-48D2-9569-E616BFAAA607", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF6CF2B3-671F-425B-8F2A-20E909249C84", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password." } ], "id": "CVE-2005-2069", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-06-30T04:00:00.000", "references": [ { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-07/0060.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=96767" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "http://bugzilla.padl.com/show_bug.cgi?id=210" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "http://bugzilla.padl.com/show_bug.cgi?id=211" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/17233" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/17845" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/21520" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-157.htm" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200507-13.xml" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.openldap.org/its/index.cgi/Incoming?id=3791" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/17692" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-751.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-767.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/14125" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/14126" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/usn-152-1" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:121" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=161990" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21245" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9445" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-07/0060.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=96767" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "http://bugzilla.padl.com/show_bug.cgi?id=210" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "http://bugzilla.padl.com/show_bug.cgi?id=211" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/17233" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/17845" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/21520" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-157.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200507-13.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.openldap.org/its/index.cgi/Incoming?id=3791" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/17692" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-751.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-767.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/14125" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/14126" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/usn-152-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:121" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=161990" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21245" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9445" } ], "sourceIdentifier": "secalert@redhat.com", "vendorComments": [ { "comment": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "lastModified": "2007-03-14T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-04-28 19:15
Modified
2024-11-21 04:59
Severity ?
Summary
In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters with nested boolean expressions can result in denial of service (daemon crash).
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00016.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://bugs.openldap.org/show_bug.cgi?id=9202 | Exploit, Patch, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_4/CHANGES | Release Notes, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/commit/98464c11df8247d6a11b52e294ba5dd4f0380440 | Patch, Vendor Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2020/05/msg00001.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20200511-0003/ | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT211289 | Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/4352-1/ | Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/4352-2/ | Third Party Advisory | |
cve@mitre.org | https://www.debian.org/security/2020/dsa-4666 | Third Party Advisory | |
cve@mitre.org | https://www.oracle.com/security-alerts/cpuapr2022.html | Third Party Advisory | |
cve@mitre.org | https://www.oracle.com/security-alerts/cpuoct2020.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00016.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.openldap.org/show_bug.cgi?id=9202 | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_4/CHANGES | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/commit/98464c11df8247d6a11b52e294ba5dd4f0380440 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2020/05/msg00001.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20200511-0003/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT211289 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4352-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4352-2/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2020/dsa-4666 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuapr2022.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuoct2020.html | Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
opensuse | leap | 15.1 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 19.10 | |
canonical | ubuntu_linux | 20.04 | |
netapp | cloud_backup | - | |
netapp | steelstore_cloud_integrated_storage | - | |
netapp | h410c_firmware | - | |
netapp | h410c | - | |
netapp | h300s_firmware | - | |
netapp | h300s | - | |
netapp | h500s_firmware | - | |
netapp | h500s | - | |
netapp | h700s_firmware | - | |
netapp | h700s | - | |
netapp | h300e_firmware | - | |
netapp | h300e | - | |
netapp | h500e_firmware | - | |
netapp | h500e | - | |
netapp | h700e_firmware | - | |
netapp | h700e | - | |
netapp | h410s_firmware | - | |
netapp | h410s | - | |
broadcom | brocade_fabric_operating_system | - | |
apple | mac_os_x | * | |
apple | mac_os_x | * | |
apple | mac_os_x | * | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.13.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
oracle | zfs_storage_appliance_kit | 8.8 | |
oracle | solaris | 10 | |
oracle | solaris | 11 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "3EB04B76-D62B-4B90-82C7-2C24C0B90A33", "versionEndExcluding": "2.4.50", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:*", "matchCriteriaId": "1F3EFED2-F6BC-46D9-AB22-D5ED87EF4549", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "108A2215-50FB-4074-94CF-C130FA14566D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AFC73CE-ABB9-42D3-9A71-3F5BC5381E0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "32F0B6C0-F930-480D-962B-3F4EFDCC13C7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*", "matchCriteriaId": "803BC414-B250-4E3A-A478-A3881340D6B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FEB3337-BFDE-462A-908B-176F92053CEC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*", "matchCriteriaId": "736AEAE9-782B-4F71-9893-DED53367E102", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:broadcom:brocade_fabric_operating_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "390BCCEF-BD91-426B-B89C-D9371A02FA9C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DA1C24E-B74D-4C8C-931D-AE35BFB4F0CC", "versionEndExcluding": "10.13.6", "versionStartIncluding": "10.13.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E76BECE-0843-4B9F-90DE-7690764701B0", "versionEndExcluding": "10.14.6", "versionStartIncluding": "10.14.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B5F6281-877C-491C-9C4A-C28C604FB422", "versionEndExcluding": "10.15.6", "versionStartIncluding": "10.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-002:*:*:*:*:*:*", "matchCriteriaId": "0D845143-1B4D-478B-B83E-8F1664CBCAC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-003:*:*:*:*:*:*", "matchCriteriaId": "23C6DF6A-9A30-4F9E-BD9C-C19D8551C6DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-001:*:*:*:*:*:*", "matchCriteriaId": "754A2DF4-8724-4448-A2AB-AC5442029CB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-002:*:*:*:*:*:*", "matchCriteriaId": "D392C777-1949-4920-B459-D083228E4688", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-003:*:*:*:*:*:*", "matchCriteriaId": "68B0A232-F2A4-4B87-99EB-3A532DFA87DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-004:*:*:*:*:*:*", "matchCriteriaId": "0DF528F7-0F1E-4E55-A088-91327E3C360C", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-005:*:*:*:*:*:*", "matchCriteriaId": "E222445A-D398-47C8-9639-4BAE36B69AA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-006:*:*:*:*:*:*", "matchCriteriaId": "9425DAC8-038D-4B09-A074-3780AED912FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-007:*:*:*:*:*:*", "matchCriteriaId": "8EA63C1C-1EEC-4961-A7B7-439D21293B99", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-001:*:*:*:*:*:*", "matchCriteriaId": "B2F5D631-2306-4526-BEE5-22456D95ABAB", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-002:*:*:*:*:*:*", "matchCriteriaId": "F79B7361-F2F2-4FA6-A27D-CC8F2D37A726", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-003:*:*:*:*:*:*", "matchCriteriaId": "09FA5087-C576-483F-B660-F9D155933CC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.13.6:supplemental_update:*:*:*:*:*:*", "matchCriteriaId": "4F7E284D-75F5-43E8-ABD4-13DD4F3945F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*", "matchCriteriaId": "CFE26ECC-A2C2-4501-9950-510DE0E1BD86", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*", "matchCriteriaId": "26108BEF-0847-4AB0-BD98-35344DFA7835", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*", "matchCriteriaId": "A369D48B-6A0A-47AE-9513-D5E2E6F30931", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*", "matchCriteriaId": "510F8317-94DA-498E-927A-83D5F41AF54A", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*", "matchCriteriaId": "0D5D1970-6D2A-42CA-A203-42023D71730D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*", "matchCriteriaId": "C68AE52B-5139-40A4-AE9A-E752DBF07D1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*", "matchCriteriaId": "0FD3467D-7679-479F-9C0B-A93F7CD0929D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*", "matchCriteriaId": "D4C6098E-EDBD-4A85-8282-B2E9D9333872", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*", "matchCriteriaId": "518BB47B-DD76-4E8C-9F10-7EBC1E146191", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*", "matchCriteriaId": "63940A55-D851-46EB-9668-D82BEFC1FE95", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*", "matchCriteriaId": "68C7A97A-3801-44FA-96CA-10298FA39883", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*", "matchCriteriaId": "6D69914D-46C7-4A0E-A075-C863C1692D33", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*", "matchCriteriaId": "9CDB4476-B521-43E4-A129-8718A8E0A8CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*", "matchCriteriaId": "9D072B77-BE3F-4A2E-B66A-E2C8DC3781E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*", "matchCriteriaId": "A4A6BF78-B772-435C-AC1A-2199027CCF9E", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-003:*:*:*:*:*:*", "matchCriteriaId": "9A233DE4-D09A-4157-B852-E675889DD4C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*", "matchCriteriaId": "2C88BD98-46F5-447F-963A-FB9B167E31BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*", "matchCriteriaId": "C7A0615B-D958-4BBF-B53F-AA839A0FE845", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*", "matchCriteriaId": "D3E503FB-6279-4D4A-91D8-E237ECF9D2B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*", "matchCriteriaId": "964B57CD-CB8A-4520-B358-1C93EC5EF2DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*", "matchCriteriaId": "8E8C192B-8044-4BF9-9F1F-57371FC0E8FD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters with nested boolean expressions can result in denial of service (daemon crash)." }, { "lang": "es", "value": "En el archivo filter.c en slapd en OpenLDAP versiones anteriores a 2.4.50, los filtros de b\u00fasqueda de LDAP con expresiones booleanas anidadas pueden resultar en una denegaci\u00f3n de servicio (bloqueo del demonio)." } ], "id": "CVE-2020-12243", "lastModified": "2024-11-21T04:59:22.057", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-28T19:15:12.267", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00016.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9202" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_4/CHANGES" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/98464c11df8247d6a11b52e294ba5dd4f0380440" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200511-0003/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT211289" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4352-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4352-2/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4666" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9202" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_4/CHANGES" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/98464c11df8247d6a11b52e294ba5dd4f0380440" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200511-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT211289" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4352-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4352-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4666" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-674" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-01-26 18:15
Modified
2024-11-21 05:29
Severity ?
Summary
A flaw was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Values Return Filter control handling, resulting in denial of service (double free and out-of-bounds read).
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/64 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/65 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/70 | Mailing List, Third Party Advisory | |
cve@mitre.org | https://bugs.openldap.org/show_bug.cgi?id=9408 | Issue Tracking, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/commit/21981053a1195ae1555e23df4d9ac68d34ede9dd | Patch, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20210226-0002/ | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212529 | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212530 | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212531 | Third Party Advisory | |
cve@mitre.org | https://www.debian.org/security/2021/dsa-4845 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/64 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/65 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/70 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.openldap.org/show_bug.cgi?id=9408 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/commit/21981053a1195ae1555e23df4d9ac68d34ede9dd | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20210226-0002/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212529 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212530 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212531 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2021/dsa-4845 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
apple | mac_os_x | * | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | macos | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "2192B6C0-FDC8-4609-B6C4-C78633717D07", "versionEndExcluding": "2.4.57", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E76BECE-0843-4B9F-90DE-7690764701B0", "versionEndExcluding": "10.14.6", "versionStartIncluding": "10.14.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*", "matchCriteriaId": "693E7DAE-BBF0-4D48-9F8A-20DDBD4AAC0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*", "matchCriteriaId": "A369D48B-6A0A-47AE-9513-D5E2E6F30931", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*", "matchCriteriaId": "510F8317-94DA-498E-927A-83D5F41AF54A", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*", "matchCriteriaId": "0D5D1970-6D2A-42CA-A203-42023D71730D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*", "matchCriteriaId": "C68AE52B-5139-40A4-AE9A-E752DBF07D1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*", "matchCriteriaId": "0FD3467D-7679-479F-9C0B-A93F7CD0929D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*", "matchCriteriaId": "D4C6098E-EDBD-4A85-8282-B2E9D9333872", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*", "matchCriteriaId": "518BB47B-DD76-4E8C-9F10-7EBC1E146191", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*", "matchCriteriaId": "63940A55-D851-46EB-9668-D82BEFC1FE95", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*", "matchCriteriaId": "68C7A97A-3801-44FA-96CA-10298FA39883", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*", "matchCriteriaId": "6D69914D-46C7-4A0E-A075-C863C1692D33", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*", "matchCriteriaId": "9CDB4476-B521-43E4-A129-8718A8E0A8CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*", "matchCriteriaId": "9D072B77-BE3F-4A2E-B66A-E2C8DC3781E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*", "matchCriteriaId": "A4A6BF78-B772-435C-AC1A-2199027CCF9E", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-003:*:*:*:*:*:*", "matchCriteriaId": "9A233DE4-D09A-4157-B852-E675889DD4C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*", "matchCriteriaId": "2C88BD98-46F5-447F-963A-FB9B167E31BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*", "matchCriteriaId": "C7A0615B-D958-4BBF-B53F-AA839A0FE845", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "617E79BC-1012-4778-BDE7-44A238CC8D7A", "versionEndExcluding": "11.4", "versionStartIncluding": "11.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Values Return Filter control handling, resulting in denial of service (double free and out-of-bounds read)." }, { "lang": "es", "value": "Se detect\u00f3 un fallo en OpenLDAP versiones anteriores a 2.4.57, conllevando un bloqueo de slapd en el manejo del control de Values Return Filter, resultando en una denegaci\u00f3n de servicio (doble liberaci\u00f3n y lectura fuera de l\u00edmites)" } ], "id": "CVE-2020-36223", "lastModified": "2024-11-21T05:29:04.650", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-26T18:15:56.867", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9408" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/21981053a1195ae1555e23df4d9ac68d34ede9dd" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212529" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212530" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212531" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9408" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/21981053a1195ae1555e23df4d9ac68d34ede9dd" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4845" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" }, { "lang": "en", "value": "CWE-415" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-01-26 18:15
Modified
2024-11-21 05:29
Severity ?
Summary
An integer underflow was discovered in OpenLDAP before 2.4.57 leading to slapd crashes in the Certificate Exact Assertion processing, resulting in denial of service (schema_init.c serialNumberAndIssuerCheck).
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/64 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/65 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/70 | Mailing List, Third Party Advisory | |
cve@mitre.org | https://bugs.openldap.org/show_bug.cgi?id=9404 | Issue Tracking, Vendor Advisory | |
cve@mitre.org | https://bugs.openldap.org/show_bug.cgi?id=9424 | Issue Tracking, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/commit/38ac838e4150c626bbfa0082b7e2cf3a2bb4df31 | Patch, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/commit/58c1748e81c843c5b6e61648d2a4d1d82b47e842 | Patch, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20210226-0002/ | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212529 | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212530 | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212531 | Third Party Advisory | |
cve@mitre.org | https://www.debian.org/security/2021/dsa-4845 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/64 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/65 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/70 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.openldap.org/show_bug.cgi?id=9404 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.openldap.org/show_bug.cgi?id=9424 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/commit/38ac838e4150c626bbfa0082b7e2cf3a2bb4df31 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/commit/58c1748e81c843c5b6e61648d2a4d1d82b47e842 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20210226-0002/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212529 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212530 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212531 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2021/dsa-4845 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
apple | mac_os_x | * | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | macos | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "2192B6C0-FDC8-4609-B6C4-C78633717D07", "versionEndExcluding": "2.4.57", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E76BECE-0843-4B9F-90DE-7690764701B0", "versionEndExcluding": "10.14.6", "versionStartIncluding": "10.14.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*", "matchCriteriaId": "693E7DAE-BBF0-4D48-9F8A-20DDBD4AAC0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*", "matchCriteriaId": "A369D48B-6A0A-47AE-9513-D5E2E6F30931", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*", "matchCriteriaId": "510F8317-94DA-498E-927A-83D5F41AF54A", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*", "matchCriteriaId": "0D5D1970-6D2A-42CA-A203-42023D71730D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*", "matchCriteriaId": "C68AE52B-5139-40A4-AE9A-E752DBF07D1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*", "matchCriteriaId": "0FD3467D-7679-479F-9C0B-A93F7CD0929D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*", "matchCriteriaId": "D4C6098E-EDBD-4A85-8282-B2E9D9333872", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*", "matchCriteriaId": "518BB47B-DD76-4E8C-9F10-7EBC1E146191", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*", "matchCriteriaId": "63940A55-D851-46EB-9668-D82BEFC1FE95", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*", "matchCriteriaId": "68C7A97A-3801-44FA-96CA-10298FA39883", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*", "matchCriteriaId": "6D69914D-46C7-4A0E-A075-C863C1692D33", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*", "matchCriteriaId": "9CDB4476-B521-43E4-A129-8718A8E0A8CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*", "matchCriteriaId": "9D072B77-BE3F-4A2E-B66A-E2C8DC3781E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*", "matchCriteriaId": "A4A6BF78-B772-435C-AC1A-2199027CCF9E", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-003:*:*:*:*:*:*", "matchCriteriaId": "9A233DE4-D09A-4157-B852-E675889DD4C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*", "matchCriteriaId": "2C88BD98-46F5-447F-963A-FB9B167E31BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*", "matchCriteriaId": "C7A0615B-D958-4BBF-B53F-AA839A0FE845", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "617E79BC-1012-4778-BDE7-44A238CC8D7A", "versionEndExcluding": "11.4", "versionStartIncluding": "11.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An integer underflow was discovered in OpenLDAP before 2.4.57 leading to slapd crashes in the Certificate Exact Assertion processing, resulting in denial of service (schema_init.c serialNumberAndIssuerCheck)." }, { "lang": "es", "value": "Se detect\u00f3 un subdesbordamiento de enteros en OpenLDAP versiones anteriores a 2.4.57, conllevando bloqueos de slapd en el procesamiento de Certificate Exact Assertion, resultando en una denegaci\u00f3n de servicio (serialNumberAndIssuerCheck de schema_init.c)" } ], "id": "CVE-2020-36221", "lastModified": "2024-11-21T05:29:04.100", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-26T18:15:56.693", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9404" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9424" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/38ac838e4150c626bbfa0082b7e2cf3a2bb4df31" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/58c1748e81c843c5b6e61648d2a4d1d82b47e842" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212529" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212530" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212531" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9404" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9424" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/38ac838e4150c626bbfa0082b7e2cf3a2bb4df31" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/58c1748e81c843c5b6e61648d2a4d1d82b47e842" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4845" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-191" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-06-01 17:02
Modified
2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in st.c in slurpd for OpenLDAP before 2.3.22 might allow attackers to execute arbitrary code via a long hostname.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/20126 | Patch, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/20495 | ||
cve@mitre.org | http://secunia.com/advisories/20685 | ||
cve@mitre.org | http://secunia.com/advisories/20848 | ||
cve@mitre.org | http://www.gentoo.org/security/en/glsa/glsa-200606-17.xml | ||
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDKSA-2006:096 | ||
cve@mitre.org | http://www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c.diff?r1=1.21&r2=1.22&hideattic=1&sortbydate=0&f=h | Patch | |
cve@mitre.org | http://www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c?hideattic=1&sortbydate=0#rev1.22 | Patch | |
cve@mitre.org | http://www.openldap.org/software/release/changes.html | Patch | |
cve@mitre.org | http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.008-openldap.html | Patch | |
cve@mitre.org | http://www.osvdb.org/25659 | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/436674/100/0/threaded | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2006/1921 | ||
cve@mitre.org | https://usn.ubuntu.com/305-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/20126 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/20495 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/20685 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/20848 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.gentoo.org/security/en/glsa/glsa-200606-17.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2006:096 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c.diff?r1=1.21&r2=1.22&hideattic=1&sortbydate=0&f=h | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c?hideattic=1&sortbydate=0#rev1.22 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/software/release/changes.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.008-openldap.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/25659 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/436674/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2006/1921 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/305-1/ |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | 2.2.1 | |
openldap | openldap | 2.2.11 | |
openldap | openldap | 2.2.12 | |
openldap | openldap | 2.2.13 | |
openldap | openldap | 2.2.14 | |
openldap | openldap | 2.2.15 | |
openldap | openldap | 2.2.16 | |
openldap | openldap | 2.2.17 | |
openldap | openldap | 2.2.18 | |
openldap | openldap | 2.2.19 | |
openldap | openldap | 2.2.20 | |
openldap | openldap | 2.2.21 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C2F45B8-B9FB-4D43-B2DD-98413F5F2B85", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "1DCE7803-E652-4A17-8EEB-B91C81CF48E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "DA5CB439-5F0B-40CF-8564-6875CAC74FCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB5E524E-1B71-46B5-A14E-C2342851C0FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "FE103338-9AE7-4230-A8B2-09273004B4D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "12621DED-ABF1-47A7-961C-E6DE1F6302AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "C8026929-4845-46E4-A6F8-E60CA498201B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "DE01BD68-D6DC-4220-A3F0-71961CEA205F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "68DE3F16-E171-4FA3-9B00-3F944A4E7604", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "63F7B718-0E5C-4900-A5DE-D59D37EC79D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "8B8805A0-F543-450D-82E9-EE923904E2A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.21:*:*:*:*:*:*:*", "matchCriteriaId": "58779045-578C-41D5-9CAE-D6F48C91654C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in st.c in slurpd for OpenLDAP before 2.3.22 might allow attackers to execute arbitrary code via a long hostname." } ], "id": "CVE-2006-2754", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-06-01T17:02:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20126" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/20495" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/20685" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/20848" }, { "source": "cve@mitre.org", "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-17.xml" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:096" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c.diff?r1=1.21\u0026r2=1.22\u0026hideattic=1\u0026sortbydate=0\u0026f=h" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c?hideattic=1\u0026sortbydate=0#rev1.22" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.openldap.org/software/release/changes.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.008-openldap.html" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/25659" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/436674/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/1921" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/305-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20126" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20495" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20685" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20848" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-17.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:096" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c.diff?r1=1.21\u0026r2=1.22\u0026hideattic=1\u0026sortbydate=0\u0026f=h" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c?hideattic=1\u0026sortbydate=0#rev1.22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openldap.org/software/release/changes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.008-openldap.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/25659" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/436674/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/1921" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/305-1/" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "This issue is not exploitable as the status file is only written to and read by the slurpd process. Therefore this is not a vulnerability that affects Red Hat Enterprise Linux 2.1, 3, or 4.\n", "lastModified": "2006-08-16T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-01-26 18:15
Modified
2024-11-21 05:29
Severity ?
Summary
A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/64 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/65 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/70 | Mailing List, Third Party Advisory | |
cve@mitre.org | https://bugs.openldap.org/show_bug.cgi?id=9409 | Issue Tracking, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65 | Patch, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26 | Patch, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439 | Patch, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8 | Patch, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20210226-0002/ | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212529 | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212530 | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212531 | Third Party Advisory | |
cve@mitre.org | https://www.debian.org/security/2021/dsa-4845 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/64 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/65 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/70 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.openldap.org/show_bug.cgi?id=9409 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20210226-0002/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212529 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212530 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212531 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2021/dsa-4845 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
apple | mac_os_x | * | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | macos | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "2192B6C0-FDC8-4609-B6C4-C78633717D07", "versionEndExcluding": "2.4.57", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E76BECE-0843-4B9F-90DE-7690764701B0", "versionEndExcluding": "10.14.6", "versionStartIncluding": "10.14.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*", "matchCriteriaId": "693E7DAE-BBF0-4D48-9F8A-20DDBD4AAC0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*", "matchCriteriaId": "A369D48B-6A0A-47AE-9513-D5E2E6F30931", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*", "matchCriteriaId": "510F8317-94DA-498E-927A-83D5F41AF54A", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*", "matchCriteriaId": "0D5D1970-6D2A-42CA-A203-42023D71730D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*", "matchCriteriaId": "C68AE52B-5139-40A4-AE9A-E752DBF07D1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*", "matchCriteriaId": "0FD3467D-7679-479F-9C0B-A93F7CD0929D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*", "matchCriteriaId": "D4C6098E-EDBD-4A85-8282-B2E9D9333872", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*", "matchCriteriaId": "518BB47B-DD76-4E8C-9F10-7EBC1E146191", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*", "matchCriteriaId": "63940A55-D851-46EB-9668-D82BEFC1FE95", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*", "matchCriteriaId": "68C7A97A-3801-44FA-96CA-10298FA39883", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*", "matchCriteriaId": "6D69914D-46C7-4A0E-A075-C863C1692D33", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*", "matchCriteriaId": "9CDB4476-B521-43E4-A129-8718A8E0A8CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*", "matchCriteriaId": "9D072B77-BE3F-4A2E-B66A-E2C8DC3781E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*", "matchCriteriaId": "A4A6BF78-B772-435C-AC1A-2199027CCF9E", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-003:*:*:*:*:*:*", "matchCriteriaId": "9A233DE4-D09A-4157-B852-E675889DD4C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*", "matchCriteriaId": "2C88BD98-46F5-447F-963A-FB9B167E31BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*", "matchCriteriaId": "C7A0615B-D958-4BBF-B53F-AA839A0FE845", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "617E79BC-1012-4778-BDE7-44A238CC8D7A", "versionEndExcluding": "11.4", "versionStartIncluding": "11.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service." }, { "lang": "es", "value": "Se detect\u00f3 un fallo en OpenLDAP versiones anteriores a 2.4.57, conllevando a la liberaci\u00f3n de un puntero no v\u00e1lido y un bloqueo de slapd en el procesamiento saslAuthzTo, resultando en una denegaci\u00f3n de servicio" } ], "id": "CVE-2020-36224", "lastModified": "2024-11-21T05:29:04.900", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-26T18:15:56.973", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9409" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212529" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212530" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212531" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9409" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4845" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-763" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-10-23 19:30
Modified
2025-04-09 00:30
Severity ?
Summary
libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036138.html | Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://marc.info/?l=oss-security&m=125198917018936&w=2 | Third Party Advisory | |
cve@mitre.org | http://marc.info/?l=oss-security&m=125369675820512&w=2 | Third Party Advisory | |
cve@mitre.org | http://secunia.com/advisories/38769 | Third Party Advisory | |
cve@mitre.org | http://secunia.com/advisories/40677 | Third Party Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-201406-36.xml | Third Party Advisory | |
cve@mitre.org | http://support.apple.com/kb/HT3937 | Broken Link | |
cve@mitre.org | http://www.openldap.org/devel/cvsweb.cgi/libraries/libldap/tls_o.c.diff?r1=1.8&r2=1.11&f=h | Patch, Vendor Advisory | |
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2010-0543.html | Third Party Advisory | |
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2011-0896.html | Third Party Advisory | |
cve@mitre.org | http://www.vupen.com/english/advisories/2009/3056 | Third Party Advisory | |
cve@mitre.org | http://www.vupen.com/english/advisories/2010/1858 | Third Party Advisory | |
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11178 | Third Party Advisory | |
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7274 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036138.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=oss-security&m=125198917018936&w=2 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=oss-security&m=125369675820512&w=2 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38769 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/40677 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201406-36.xml | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT3937 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/devel/cvsweb.cgi/libraries/libldap/tls_o.c.diff?r1=1.8&r2=1.11&f=h | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2010-0543.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-0896.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/3056 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1858 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11178 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7274 | Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "1479E6E9-32C0-437A-97D0-896D354BCF46", "versionEndExcluding": "2.4.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDA1CA86-1405-4C25-9BC2-5A5E6A76B911", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "8333C974-DF5B-4098-A766-EB8D875817F5", "versionEndExcluding": "10.6.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*", "matchCriteriaId": "B3BB5EDB-520B-4DEF-B06E-65CA13152824", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408." }, { "lang": "es", "value": "libraries/libldap/tls_o.c en OpenLDAP, cuando se usa OpenSSL, no maneja de forma adecuada el caracter \u0027\\0\u0027 en un nombre de dominio, dentro del campo sujeto del Common Name (CN) en los certificados X.509, lo\r\nque permite a atacantes man-in-the-middle, esp\u00edar servidores SSL de su elecci\u00f3n a trav\u00e9s de certificados manipulados concedidos por Autoridades Certificadoras, esta relacionado con CVE-2009-2408.\r\n" } ], "id": "CVE-2009-3767", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-10-23T19:30:00.250", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036138.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=oss-security\u0026m=125198917018936\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=oss-security\u0026m=125369675820512\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/38769" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/40677" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://support.apple.com/kb/HT3937" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.openldap.org/devel/cvsweb.cgi/libraries/libldap/tls_o.c.diff?r1=1.8\u0026r2=1.11\u0026f=h" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0543.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0896.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3056" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1858" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11178" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7274" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036138.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=oss-security\u0026m=125198917018936\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=oss-security\u0026m=125369675820512\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/38769" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/40677" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://support.apple.com/kb/HT3937" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.openldap.org/devel/cvsweb.cgi/libraries/libldap/tls_o.c.diff?r1=1.8\u0026r2=1.11\u0026f=h" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0543.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0896.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1858" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11178" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7274" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-3767\n\nThis issue was addressed in the openldap packages as shipped with Red Hat Enterprise Linux 5 and 4 via: https://rhn.redhat.com/errata/RHSA-2010-0198.html and https://rhn.redhat.com/errata/RHSA-2010-0543.html respectively.\n\nThe Red Hat Security Response Team has rated this issue as having moderate security impact, a future openldap update may address this flaw in Red Hat Enterprise Linux 3.", "lastModified": "2010-07-20T00:00:00", "organization": "Red Hat" }, { "comment": "OpenLDAP reported this issue and published a patch for it on 2009-07-30. The patch was included in OpenLDAP 2.4.18 which was released on 2009-09-06. The current release of OpenLDAP is available from the following location:\n\nhttp://www.openldap.org/software/download/", "lastModified": "2009-10-30T00:00:00", "organization": "OpenLDAP" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-07-14 14:15
Modified
2024-11-21 05:06
Severity ?
Summary
libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHBA-2019:3674 | Third Party Advisory | |
cve@mitre.org | https://bugs.openldap.org/show_bug.cgi?id=9266 | Permissions Required, Vendor Advisory | |
cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=1740070 | Issue Tracking, Third Party Advisory | |
cve@mitre.org | https://kc.mcafee.com/corporate/index?page=content&id=SB10365 | Third Party Advisory | |
cve@mitre.org | https://www.oracle.com/security-alerts/cpuapr2022.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHBA-2019:3674 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.openldap.org/show_bug.cgi?id=9266 | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1740070 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://kc.mcafee.com/corporate/index?page=content&id=SB10365 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuapr2022.html | Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
redhat | enterprise_linux | 8.0 | |
opensuse | leap | 15.1 | |
opensuse | leap | 15.2 | |
mcafee | policy_auditor | * | |
oracle | blockchain_platform | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EAD4D69-D10C-4D63-A61B-2EC36A6D5193", "versionEndExcluding": "2.4.46-10.el8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "matchCriteriaId": "B009C22E-30A4-4288-BCF6-C3E81DEAF45A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB739B3A-20BB-4118-82DD-7ACFE5881FE2", "versionEndExcluding": "6.5.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0DBC938-A782-433F-8BF1-CA250C332AA7", "versionEndExcluding": "21.1.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux." }, { "lang": "es", "value": "libldap en determinados paquetes OpenLDAP de terceros presenta un fallo de comprobaci\u00f3n de certificados cuando el paquete de terceros est\u00e1 afirmando que admite RFC6125. Considera CN incluso cuando se presenta un subjectAltName (SAN) no coincidente. Esto es corregido, por ejemplo, en la versi\u00f3n openldap-2.4.46-10.el8 en Red Hat Enterprise" } ], "id": "CVE-2020-15719", "lastModified": "2024-11-21T05:06:05.903", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-07-14T14:15:17.667", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:3674" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9266" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1740070" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:3674" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9266" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1740070" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-09-05 18:29
Modified
2025-04-20 01:37
Severity ?
Summary
slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command, as demonstrated by openldap-initscript.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.openldap.org/its/index.cgi?findid=8703 | Issue Tracking, Mailing List, Vendor Advisory | |
cve@mitre.org | https://www.oracle.com/security-alerts/cpuapr2022.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/its/index.cgi?findid=8703 | Issue Tracking, Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuapr2022.html | Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
oracle | blockchain_platform | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "00A6E51B-52B6-4190-BB10-3622D575A7D5", "versionEndIncluding": "2.4.45", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0DBC938-A782-433F-8BF1-CA250C332AA7", "versionEndExcluding": "21.1.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a \"kill `cat /pathname`\" command, as demonstrated by openldap-initscript." }, { "lang": "es", "value": "slapd en OpenLDAP en su versi\u00f3n 2.4.45 y anteriores crea un archivo PID tras eliminar privilegios a una cuenta no-root, lo que podr\u00eda permitir que usuarios locales terminen procesos arbitrarios aprovechando el acceso a esta cuenta no-root para modificar el archivo PID antes de que un script root ejecute un comando \"kill `cat /pathname`\". Esto se ha demostrado con openldap-initscript." } ], "id": "CVE-2017-14159", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-09-05T18:29:00.133", "references": [ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mailing List", "Vendor Advisory" ], "url": "http://www.openldap.org/its/index.cgi?findid=8703" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List", "Vendor Advisory" ], "url": "http://www.openldap.org/its/index.cgi?findid=8703" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-665" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-09-11 16:59
Modified
2025-04-12 10:46
Severity ?
Summary
The ber_get_next function in libraries/liblber/io.c in OpenLDAP 2.4.42 and earlier allows remote attackers to cause a denial of service (reachable assertion and application crash) via crafted BER data, as demonstrated by an attack against slapd.
References
▶ | URL | Tags | |
---|---|---|---|
security@debian.org | http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html | ||
security@debian.org | http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html | ||
security@debian.org | http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html | ||
security@debian.org | http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html | ||
security@debian.org | http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html | ||
security@debian.org | http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html | ||
security@debian.org | http://rhn.redhat.com/errata/RHSA-2015-1840.html | ||
security@debian.org | http://www.debian.org/security/2015/dsa-3356 | ||
security@debian.org | http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commit%3Bh=6fe51a9ab04fd28bbc171da3cf12f1c1040d6629 | ||
security@debian.org | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=8240 | Exploit, Vendor Advisory | |
security@debian.org | http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html | ||
security@debian.org | http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html | ||
security@debian.org | http://www.security-assessment.com/files/documents/advisory/OpenLDAP-ber_get_next-Denial-of-Service.pdf | ||
security@debian.org | http://www.securityfocus.com/bid/76714 | ||
security@debian.org | http://www.securitytracker.com/id/1033534 | ||
security@debian.org | http://www.ubuntu.com/usn/USN-2742-1 | ||
security@debian.org | https://support.apple.com/HT205637 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2015-1840.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2015/dsa-3356 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commit%3Bh=6fe51a9ab04fd28bbc171da3cf12f1c1040d6629 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=8240 | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.security-assessment.com/files/documents/advisory/OpenLDAP-ber_get_next-Denial-of-Service.pdf | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/76714 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1033534 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2742-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/HT205637 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "90EB80C7-5A71-405D-BB93-BFA065F12487", "versionEndIncluding": "2.4.42", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "767D7ECF-24C5-4605-9368-5A41456A475E", "versionEndIncluding": "10.11.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ber_get_next function in libraries/liblber/io.c in OpenLDAP 2.4.42 and earlier allows remote attackers to cause a denial of service (reachable assertion and application crash) via crafted BER data, as demonstrated by an attack against slapd." }, { "lang": "es", "value": "Vulnerabilidad en la funci\u00f3n ber_get_next en libraries/liblber/io.c en OpenLDAP 2.4.42 y versiones anteriores, permite a atacantes remotos causar una denegaci\u00f3n de servicio (aserci\u00f3n accesible y ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de datos BER manipulados, seg\u00fan lo demostrado por un ataque contra slapd." } ], "id": "CVE-2015-6908", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-09-11T16:59:12.800", "references": [ { "source": "security@debian.org", "url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html" }, { "source": "security@debian.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html" }, { "source": "security@debian.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html" }, { "source": "security@debian.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html" }, { "source": "security@debian.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html" }, { "source": "security@debian.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html" }, { "source": "security@debian.org", "url": "http://rhn.redhat.com/errata/RHSA-2015-1840.html" }, { "source": "security@debian.org", "url": "http://www.debian.org/security/2015/dsa-3356" }, { "source": "security@debian.org", "url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commit%3Bh=6fe51a9ab04fd28bbc171da3cf12f1c1040d6629" }, { "source": "security@debian.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=8240" }, { "source": "security@debian.org", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "source": "security@debian.org", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "source": "security@debian.org", "url": "http://www.security-assessment.com/files/documents/advisory/OpenLDAP-ber_get_next-Denial-of-Service.pdf" }, { "source": "security@debian.org", "url": "http://www.securityfocus.com/bid/76714" }, { "source": "security@debian.org", "url": "http://www.securitytracker.com/id/1033534" }, { "source": "security@debian.org", "url": "http://www.ubuntu.com/usn/USN-2742-1" }, { "source": "security@debian.org", "url": "https://support.apple.com/HT205637" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1840.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3356" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commit%3Bh=6fe51a9ab04fd28bbc171da3cf12f1c1040d6629" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=8240" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.security-assessment.com/files/documents/advisory/OpenLDAP-ber_get_next-Denial-of-Service.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/76714" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1033534" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2742-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/HT205637" } ], "sourceIdentifier": "security@debian.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-01-26 18:15
Modified
2024-11-21 05:29
Severity ?
Summary
A flaw was discovered in OpenLDAP before 2.4.57 leading to a memch->bv_len miscalculation and slapd crash in the saslAuthzTo processing, resulting in denial of service.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/64 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/65 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/70 | Mailing List, Third Party Advisory | |
cve@mitre.org | https://bugs.openldap.org/show_bug.cgi?id=9413 | Issue Tracking, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65 | Patch, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26 | Patch, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439 | Patch, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8 | Patch, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20210226-0002/ | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212529 | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212530 | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212531 | Third Party Advisory | |
cve@mitre.org | https://www.debian.org/security/2021/dsa-4845 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/64 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/65 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/70 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.openldap.org/show_bug.cgi?id=9413 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20210226-0002/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212529 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212530 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212531 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2021/dsa-4845 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
apple | mac_os_x | * | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | macos | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "2192B6C0-FDC8-4609-B6C4-C78633717D07", "versionEndExcluding": "2.4.57", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E76BECE-0843-4B9F-90DE-7690764701B0", "versionEndExcluding": "10.14.6", "versionStartIncluding": "10.14.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*", "matchCriteriaId": "693E7DAE-BBF0-4D48-9F8A-20DDBD4AAC0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*", "matchCriteriaId": "A369D48B-6A0A-47AE-9513-D5E2E6F30931", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*", "matchCriteriaId": "510F8317-94DA-498E-927A-83D5F41AF54A", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*", "matchCriteriaId": "0D5D1970-6D2A-42CA-A203-42023D71730D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*", "matchCriteriaId": "C68AE52B-5139-40A4-AE9A-E752DBF07D1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*", "matchCriteriaId": "0FD3467D-7679-479F-9C0B-A93F7CD0929D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*", "matchCriteriaId": "D4C6098E-EDBD-4A85-8282-B2E9D9333872", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*", "matchCriteriaId": "518BB47B-DD76-4E8C-9F10-7EBC1E146191", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*", "matchCriteriaId": "63940A55-D851-46EB-9668-D82BEFC1FE95", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*", "matchCriteriaId": "68C7A97A-3801-44FA-96CA-10298FA39883", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*", "matchCriteriaId": "6D69914D-46C7-4A0E-A075-C863C1692D33", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*", "matchCriteriaId": "9CDB4476-B521-43E4-A129-8718A8E0A8CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*", "matchCriteriaId": "9D072B77-BE3F-4A2E-B66A-E2C8DC3781E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*", "matchCriteriaId": "A4A6BF78-B772-435C-AC1A-2199027CCF9E", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-003:*:*:*:*:*:*", "matchCriteriaId": "9A233DE4-D09A-4157-B852-E675889DD4C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*", "matchCriteriaId": "2C88BD98-46F5-447F-963A-FB9B167E31BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*", "matchCriteriaId": "C7A0615B-D958-4BBF-B53F-AA839A0FE845", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "617E79BC-1012-4778-BDE7-44A238CC8D7A", "versionEndExcluding": "11.4", "versionStartIncluding": "11.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was discovered in OpenLDAP before 2.4.57 leading to a memch-\u003ebv_len miscalculation and slapd crash in the saslAuthzTo processing, resulting in denial of service." }, { "lang": "es", "value": "Se detect\u00f3 un fallo en OpenLDAP versiones anteriores a 2.4.57, conllevando un c\u00e1lculo inapropiado de memch-)bv_len y un bloqueo de slapd en el procesamiento de saslAuthzTo, resultando en una denegaci\u00f3n de servicio" } ], "id": "CVE-2020-36226", "lastModified": "2024-11-21T05:29:05.400", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-26T18:15:57.100", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9413" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212529" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212530" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212531" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9413" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4845" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-01-26 18:15
Modified
2024-11-21 05:29
Severity ?
Summary
An integer underflow was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Certificate List Exact Assertion processing, resulting in denial of service.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/64 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/65 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/70 | Mailing List, Third Party Advisory | |
cve@mitre.org | https://bugs.openldap.org/show_bug.cgi?id=9427 | Issue Tracking, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/commit/91dccd25c347733b365adc74cb07d074512ed5ad | Patch, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20210226-0002/ | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212529 | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212530 | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212531 | Third Party Advisory | |
cve@mitre.org | https://www.debian.org/security/2021/dsa-4845 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/64 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/65 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/70 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.openldap.org/show_bug.cgi?id=9427 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/commit/91dccd25c347733b365adc74cb07d074512ed5ad | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20210226-0002/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212529 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212530 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212531 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2021/dsa-4845 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
apple | macos | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "2192B6C0-FDC8-4609-B6C4-C78633717D07", "versionEndExcluding": "2.4.57", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "617E79BC-1012-4778-BDE7-44A238CC8D7A", "versionEndExcluding": "11.4", "versionStartIncluding": "11.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An integer underflow was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Certificate List Exact Assertion processing, resulting in denial of service." }, { "lang": "es", "value": "Se detect\u00f3 un subdesbordamiento de enteros en OpenLDAP versiones anteriores a 2.4.57, conllevando un bloqueo de slapd en el procesamiento de Certificate List Exact Assertion, resultando en una denegaci\u00f3n de servicio" } ], "id": "CVE-2020-36228", "lastModified": "2024-11-21T05:29:05.863", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-26T18:15:57.223", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9427" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/91dccd25c347733b365adc74cb07d074512ed5ad" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212529" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212530" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212531" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9427" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/91dccd25c347733b365adc74cb07d074512ed5ad" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4845" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-191" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-01-02 23:15
Modified
2024-11-21 02:18
Severity ?
Summary
An off-by-one error leading to a crash was discovered in openldap 2.4 when processing DNS SRV messages. If slapd was configured to use the dnssrv backend, an attacker could crash the service with crafted DNS responses.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://access.redhat.com/security/cve/cve-2014-8182 | Third Party Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-8182 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
secalert@redhat.com | https://bugzilla.suse.com/show_bug.cgi?id=CVE-2014-8182 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
secalert@redhat.com | https://security-tracker.debian.org/tracker/CVE-2014-8182 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/cve-2014-8182 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-8182 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.suse.com/show_bug.cgi?id=CVE-2014-8182 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-tracker.debian.org/tracker/CVE-2014-8182 | Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | 2.4 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "AF7B8F72-1490-482D-80EB-D08637F2E037", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An off-by-one error leading to a crash was discovered in openldap 2.4 when processing DNS SRV messages. If slapd was configured to use the dnssrv backend, an attacker could crash the service with crafted DNS responses." }, { "lang": "es", "value": "Se descubri\u00f3 un error por un paso conllevando a un bloqueo en openldap versi\u00f3n 2.4, cuando se procesan mensajes DNS SRV. Si slapd fue configurado para utilizar el backend dnssrv, un atacante podr\u00eda bloquear el servicio con respuestas DNS especialmente dise\u00f1adas." } ], "id": "CVE-2014-8182", "lastModified": "2024-11-21T02:18:43.707", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-02T23:15:11.747", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/cve-2014-8182" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-8182" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2014-8182" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2014-8182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/cve-2014-8182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-8182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2014-8182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2014-8182" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-193" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-05-28 11:15
Modified
2024-11-21 05:18
Severity ?
Summary
A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23(). The highest threat from this vulnerability is to system availability.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1899678 | Issue Tracking, Patch, Third Party Advisory | |
secalert@redhat.com | https://git.openldap.org/openldap/openldap/-/commit/ab3915154e69920d480205b4bf5ccb2b391a0a1f#a2feb6ed0257c21c6672793ee2f94eaadc10c72c | Patch, Vendor Advisory | |
secalert@redhat.com | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
secalert@redhat.com | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
secalert@redhat.com | https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | https://security.netapp.com/advisory/ntap-20210716-0003/ | Third Party Advisory | |
secalert@redhat.com | https://www.debian.org/security/2020/dsa-4792 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1899678 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/commit/ab3915154e69920d480205b4bf5ccb2b391a0a1f#a2feb6ed0257c21c6672793ee2f94eaadc10c72c | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20210716-0003/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2020/dsa-4792 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
redhat | jboss_core_services | - | |
redhat | jboss_enterprise_application_platform | 5.0.0 | |
redhat | jboss_enterprise_web_server | 2.0.0 | |
redhat | enterprise_linux | 5.0 | |
redhat | enterprise_linux | 6.0 | |
redhat | enterprise_linux | 7.0 | |
debian | debian_linux | 9.0 | |
fedoraproject | fedora | 33 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "21588D06-FD1B-4053-9FCE-2D4AE811119C", "versionEndExcluding": "2.4.56", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B453CF7-9AA6-4B94-A003-BF7AE0B82F53", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F5D7F1AD-4BD3-4C37-B6B5-B287464B2EEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "681173DF-537E-4A64-8FC7-75F439CCAD0D", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "1D8B549B-E57B-4DFE-8A13-CAB06B5356B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23(). The highest threat from this vulnerability is to system availability." }, { "lang": "es", "value": "Se encontr\u00f3 un fallo en OpenLDAP en versiones anteriores a 2.4.56.\u0026#xa0;Este fallo permite a un atacante que env\u00eda un paquete malicioso procesado por OpenLDAP forzar una afirmaci\u00f3n fallida en la funci\u00f3n csnNormalize23().\u0026#xa0;La mayor amenaza de esta vulnerabilidad es la disponibilidad del sistema" } ], "id": "CVE-2020-25710", "lastModified": "2024-11-21T05:18:32.650", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-05-28T11:15:07.593", "references": [ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899678" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/ab3915154e69920d480205b4bf5ccb2b391a0a1f#a2feb6ed0257c21c6672793ee2f94eaadc10c72c" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210716-0003/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4792" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899678" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/ab3915154e69920d480205b4bf5ccb2b391a0a1f#a2feb6ed0257c21c6672793ee2f94eaadc10c72c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210716-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4792" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-617" } ], "source": "secalert@redhat.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-02-01 22:00
Modified
2025-04-09 00:30
Severity ?
Summary
The BDB backend for slapd in OpenLDAP before 2.3.36 allows remote authenticated users to cause a denial of service (crash) via a potentially-successful modify operation with the NOOP control set to critical, possibly due to a double free vulnerability.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html | ||
cve@mitre.org | http://secunia.com/advisories/28817 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/28953 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/29068 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/29225 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/29256 | ||
cve@mitre.org | http://secunia.com/advisories/29682 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/29957 | Vendor Advisory | |
cve@mitre.org | http://support.apple.com/kb/HT3937 | ||
cve@mitre.org | http://wiki.rpath.com/Advisories:rPSA-2008-0059 | ||
cve@mitre.org | http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0059 | ||
cve@mitre.org | http://www.debian.org/security/2008/dsa-1541 | ||
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2008:058 | ||
cve@mitre.org | http://www.openldap.org/lists/openldap-bugs/200704/msg00067.html | ||
cve@mitre.org | http://www.openldap.org/lists/openldap-bugs/200704/msg00068.html | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2008-0110.html | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/488242/100/200/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/26245 | ||
cve@mitre.org | http://www.securitytracker.com/id?1019480 | ||
cve@mitre.org | http://www.ubuntu.com/usn/usn-584-1 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2009/3184 | Vendor Advisory | |
cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=431203 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10748 | ||
cve@mitre.org | https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00105.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28817 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28953 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29068 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29225 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29256 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29682 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29957 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT3937 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://wiki.rpath.com/Advisories:rPSA-2008-0059 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0059 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2008/dsa-1541 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2008:058 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/lists/openldap-bugs/200704/msg00067.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/lists/openldap-bugs/200704/msg00068.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0110.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/488242/100/200/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/26245 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1019480 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-584-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/3184 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=431203 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10748 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00105.html |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "44D78472-79A1-4DFD-8DAB-6AF7470C82B4", "versionEndIncluding": "2.3.35", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The BDB backend for slapd in OpenLDAP before 2.3.36 allows remote authenticated users to cause a denial of service (crash) via a potentially-successful modify operation with the NOOP control set to critical, possibly due to a double free vulnerability." }, { "lang": "es", "value": "El backend de BDB para slapd en OpenLDAP versiones anteriores a 2.3.36, permite a los usuarios autenticados remotos causar una denegaci\u00f3n de servicio (bloqueo) por medio de una operaci\u00f3n de modificaci\u00f3n potencialmente con \u00e9xito con el control NOOP establecido en cr\u00edtico, posiblemente debido a una vulnerabilidad de doble liberaci\u00f3n." } ], "id": "CVE-2007-6698", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-02-01T22:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28817" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28953" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29068" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29225" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/29256" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29682" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29957" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT3937" }, { "source": "cve@mitre.org", "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0059" }, { "source": "cve@mitre.org", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0059" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2008/dsa-1541" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:058" }, { "source": "cve@mitre.org", "url": "http://www.openldap.org/lists/openldap-bugs/200704/msg00067.html" }, { "source": "cve@mitre.org", "url": "http://www.openldap.org/lists/openldap-bugs/200704/msg00068.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2008-0110.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/488242/100/200/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/26245" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019480" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/usn-584-1" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3184" }, { "source": "cve@mitre.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431203" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10748" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00105.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28817" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28953" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29068" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29225" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29256" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29682" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29957" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT3937" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0059" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0059" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2008/dsa-1541" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:058" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openldap.org/lists/openldap-bugs/200704/msg00067.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openldap.org/lists/openldap-bugs/200704/msg00068.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0110.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/488242/100/200/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/26245" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019480" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-584-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3184" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431203" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10748" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00105.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-02-19 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
slapd in OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allows local users to overwrite arbitrary files via a race condition during the creation of a log file for rejected replication requests.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.debian.org/security/2003/dsa-227 | Patch, Vendor Advisory | |
cve@mitre.org | http://www.iss.net/security_center/static/11288.php | Vendor Advisory | |
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDKSA-2003:006 | ||
cve@mitre.org | http://www.novell.com/linux/security/advisories/2002_047_openldap2.html | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2003-040.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2003/dsa-227 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.iss.net/security_center/static/11288.php | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2003:006 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/linux/security/advisories/2002_047_openldap2.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2003-040.html | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACC88BA3-7FA3-4585-8E84-A78B19CD19A3", "versionEndIncluding": "2.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "slapd in OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allows local users to overwrite arbitrary files via a race condition during the creation of a log file for rejected replication requests." }, { "lang": "es", "value": "slapd en OpenLDAP2 (OpenLDAP 2) 2.2.0 y anteriores permiten a usuarios locales sobreescribir ficheros arbitrarios mediante una condici\u00f3n de carrera durante la creaci\u00f3n de un fichero de registro de peticiones de replicaci\u00f3n rechazadas." } ], "id": "CVE-2002-1508", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.2, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-02-19T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.debian.org/security/2003/dsa-227" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/11288.php" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:006" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2002_047_openldap2.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-040.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.debian.org/security/2003/dsa-227" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/11288.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:006" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2002_047_openldap2.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-040.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-07-16 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
slapd in OpenLDAP 1.x before 1.2.12, and 2.x before 2.0.8, allows remote attackers to cause a denial of service (crash) via an invalid Basic Encoding Rules (BER) length field.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000417 | ||
cve@mitre.org | http://www.cert.org/advisories/CA-2001-18.html | Patch, Third Party Advisory, US Government Resource | |
cve@mitre.org | http://www.debian.org/security/2001/dsa-068 | ||
cve@mitre.org | http://www.kb.cert.org/vuls/id/935800 | Patch, Third Party Advisory, US Government Resource | |
cve@mitre.org | http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-069.php3 | Patch, Vendor Advisory | |
cve@mitre.org | http://www.osvdb.org/1905 | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2001-098.html | ||
cve@mitre.org | http://www.securityfocus.com/bid/3049 | Patch, Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/6904 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000417 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.cert.org/advisories/CA-2001-18.html | Patch, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2001/dsa-068 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/935800 | Patch, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-069.php3 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/1905 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2001-098.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/3049 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/6904 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mandrakesoft | mandrake_single_network_firewall | 7.2 | |
openldap | openldap | 1.0 | |
openldap | openldap | 1.0.1 | |
openldap | openldap | 1.0.2 | |
openldap | openldap | 1.0.3 | |
openldap | openldap | 1.1 | |
openldap | openldap | 1.1.1 | |
openldap | openldap | 1.1.2 | |
openldap | openldap | 1.1.3 | |
openldap | openldap | 1.1.4 | |
openldap | openldap | 1.2 | |
openldap | openldap | 1.2.1 | |
openldap | openldap | 1.2.2 | |
openldap | openldap | 1.2.3 | |
openldap | openldap | 1.2.4 | |
openldap | openldap | 1.2.5 | |
openldap | openldap | 1.2.6 | |
openldap | openldap | 1.2.7 | |
openldap | openldap | 1.2.8 | |
openldap | openldap | 1.2.9 | |
openldap | openldap | 1.2.10 | |
openldap | openldap | 1.2.11 | |
openldap | openldap | 1.2.12 | |
openldap | openldap | 2.0 | |
openldap | openldap | 2.0.1 | |
openldap | openldap | 2.0.2 | |
openldap | openldap | 2.0.3 | |
openldap | openldap | 2.0.4 | |
openldap | openldap | 2.0.5 | |
openldap | openldap | 2.0.6 | |
openldap | openldap | 2.0.7 | |
debian | debian_linux | 2.2 | |
mandrakesoft | mandrake_linux | 7.1 | |
mandrakesoft | mandrake_linux | 7.2 | |
mandrakesoft | mandrake_linux | 8.0 | |
mandrakesoft | mandrake_linux_corporate_server | 1.0.1 | |
redhat | linux | 6.2 | |
redhat | linux | 7.0 | |
redhat | linux | 7.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mandrakesoft:mandrake_single_network_firewall:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A188467-3856-4599-A2CD-BD2655974B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "086DC60F-F530-4515-8F3D-87F30DB9B322", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D538927-82D5-476E-9C85-2E9297316D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "2A904832-A6D6-45D4-B07C-79ED1FE47A80", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BB554A4-EEC2-4E17-9F32-27A580B9E389", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "191DB249-6A73-4561-8CCA-565D1525CB31", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "34A5D9A5-FB1D-4ACF-846A-4DB73196122C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "41400CE6-FA51-435C-93F7-B31FE42F18AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "6022ABEB-6825-4A5F-9884-74F94C2387F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "D2F15789-334D-460D-B5B3-FCC71087D107", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F77B1548-BB6D-4618-AE7B-E97F91A0AF5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "B7064C52-1211-42B8-BF1F-C22D800AED07", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1CD95826-E44A-48C6-BAAB-77A905CAE6B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "FEEA6BB6-41FC-4F15-A95F-9B052F062454", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "E90766C1-6DBD-435C-85E1-920DAFA26D67", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "8CD13DAE-9588-4540-9183-FB80C507F985", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "526366F3-52F0-4816-A356-8F39B718C048", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "AC07AD0D-5DF9-41A4-8592-CEFF1842355D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "30017C56-42A9-4AF9-B5B3-7357E424F837", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "C8A51F38-3F5A-4F6D-93EE-776B5C2FF48F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "8DBEC27E-3220-42CE-B6CC-675F387CB506", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "E641DFFB-CBAF-4DCF-944F-443CFF836A53", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "A552E270-5C9C-40DC-B23D-97C8D995B8FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "552F2E25-DDB8-49A6-844A-8520696DBE5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "03D75A36-41C4-464F-8DC4-42C841ABC087", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C3EE919-D05C-4625-85FE-132F6F2B932C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "20D99A58-8D7E-4586-A9BF-1DD2A1DBB8D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DEBA0118-545E-4D7B-B819-34D157B2BA6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "67826609-F4CA-42CB-A5D0-B4503DDE2C92", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "61676BBD-95B8-44C9-BD66-79F00381BF86", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "719A9B1D-8E32-461F-BCD4-F72C6AD3E63E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "58B90124-0543-4226-BFF4-13CCCBCCB243", "vulnerable": true }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "3EC1FF5D-5EAB-44D5-B281-770547C70D68", "vulnerable": true }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "0A8FBD5A-2FD0-43CD-AC4B-1D6984D336FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "4371A667-18E1-4C54-B2E1-6F885F22F213", "vulnerable": true }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "97E09AD9-F057-4264-88BB-A8A18C1B1246", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "0633B5A6-7A88-4A96-9462-4C09D124ED36", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "29B186E5-7C2F-466E-AA4A-8F2B618F8A14", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D46E093-1C68-43BB-B281-12117EC8DE0F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "slapd in OpenLDAP 1.x before 1.2.12, and 2.x before 2.0.8, allows remote attackers to cause a denial of service (crash) via an invalid Basic Encoding Rules (BER) length field." } ], "id": "CVE-2001-0977", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-07-16T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000417" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2001-18.html" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2001/dsa-068" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/935800" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-069.php3" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/1905" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2001-098.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/3049" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6904" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000417" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2001-18.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2001/dsa-068" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/935800" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-069.php3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/1905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2001-098.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/3049" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6904" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-03-20 02:00
Modified
2025-04-11 00:51
Severity ?
Summary
modrdn.c in slapd in OpenLDAP 2.4.x before 2.4.24 allows remote attackers to cause a denial of service (daemon crash) via a relative Distinguished Name (DN) modification request (aka MODRDN operation) that contains an empty value for the OldDN field.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 | ||
secalert@redhat.com | http://openwall.com/lists/oss-security/2011/02/28/1 | ||
secalert@redhat.com | http://openwall.com/lists/oss-security/2011/02/28/2 | Patch | |
secalert@redhat.com | http://openwall.com/lists/oss-security/2011/03/01/11 | ||
secalert@redhat.com | http://openwall.com/lists/oss-security/2011/03/01/15 | ||
secalert@redhat.com | http://secunia.com/advisories/43331 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/43718 | ||
secalert@redhat.com | http://security.gentoo.org/glsa/glsa-201406-36.xml | ||
secalert@redhat.com | http://securitytracker.com/id?1025191 | ||
secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2011:055 | ||
secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2011:056 | ||
secalert@redhat.com | http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/modrdn.c.diff?r1=1.170.2.8&r2=1.170.2.9 | Patch | |
secalert@redhat.com | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6768 | ||
secalert@redhat.com | http://www.openldap.org/lists/openldap-announce/201102/msg00000.html | Patch | |
secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2011-0347.html | ||
secalert@redhat.com | http://www.ubuntu.com/usn/USN-1100-1 | ||
secalert@redhat.com | http://www.vupen.com/english/advisories/2011/0665 | Vendor Advisory | |
secalert@redhat.com | https://bugzilla.novell.com/show_bug.cgi?id=674985 | ||
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=680975 | Exploit, Patch | |
secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/66239 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2011/02/28/1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2011/02/28/2 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2011/03/01/11 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2011/03/01/15 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43331 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43718 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201406-36.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1025191 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2011:055 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2011:056 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/modrdn.c.diff?r1=1.170.2.8&r2=1.170.2.9 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6768 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/lists/openldap-announce/201102/msg00000.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-0347.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-1100-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0665 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.novell.com/show_bug.cgi?id=674985 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=680975 | Exploit, Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/66239 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | 2.4.6 | |
openldap | openldap | 2.4.7 | |
openldap | openldap | 2.4.8 | |
openldap | openldap | 2.4.9 | |
openldap | openldap | 2.4.10 | |
openldap | openldap | 2.4.11 | |
openldap | openldap | 2.4.12 | |
openldap | openldap | 2.4.13 | |
openldap | openldap | 2.4.14 | |
openldap | openldap | 2.4.15 | |
openldap | openldap | 2.4.16 | |
openldap | openldap | 2.4.17 | |
openldap | openldap | 2.4.18 | |
openldap | openldap | 2.4.19 | |
openldap | openldap | 2.4.20 | |
openldap | openldap | 2.4.21 | |
openldap | openldap | 2.4.22 | |
openldap | openldap | 2.4.23 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:2.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "5EC66226-A597-4A4C-932F-F4A7BAE119C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "4AEABC84-7B67-4FD4-A891-E52C80DC881E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "340F673A-295E-4B75-A9D1-E785B0440BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "49203E99-71E2-49D4-91A0-65AAAA7DC18F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "473AEC48-FBBF-4BEB-8728-1FA80DD94807", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "7B0415EA-5F21-44C3-93F3-DDADBAA64449", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "16AFC655-E81F-4FDE-8030-9781A8B79E73", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "E99FB859-D023-4B2B-A709-05E83A46E2A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "8D2EEBC7-1FAF-43E2-A124-C387C02D9E2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "95D242E4-D5EB-4785-A6EF-60B1E8E2B0EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "F6FEDD9C-FDF7-456A-B06C-0A4A4443991D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "9245CDE2-B90A-4D47-BA20-A7869FF0A645", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "FB993E4D-E573-4495-97DE-465DDB2AA2DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.19:*:*:*:*:*:*:*", "matchCriteriaId": "D0F106A3-63D5-4D07-9440-6628DBA78BE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.20:*:*:*:*:*:*:*", "matchCriteriaId": "36CC03BC-DF34-43CD-90B0-27D23A1DD06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.21:*:*:*:*:*:*:*", "matchCriteriaId": "16C90FEE-527E-47F5-8840-517A55163D8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.22:*:*:*:*:*:*:*", "matchCriteriaId": "0FAEA812-BB47-47A3-A975-B3B8D30DBA36", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.23:*:*:*:*:*:*:*", "matchCriteriaId": "5DE5D180-3972-40A0-ADAF-A4F3364D1381", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "modrdn.c in slapd in OpenLDAP 2.4.x before 2.4.24 allows remote attackers to cause a denial of service (daemon crash) via a relative Distinguished Name (DN) modification request (aka MODRDN operation) that contains an empty value for the OldDN field." }, { "lang": "es", "value": "modrdn.c en slapd en OpenLDAP v2.4.x anterior a v2.4.24 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de demonio) mediante una petici\u00f3n de modificaci\u00f3n del nombre completo relativo (DN) (tambi\u00e9n conocido como operaci\u00f3n MODRDN) que contiene un valor vac\u00edo para el campo OldDN." } ], "id": "CVE-2011-1081", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-03-20T02:00:04.143", "references": [ { "source": "secalert@redhat.com", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2011/02/28/1" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/02/28/2" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2011/03/01/11" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2011/03/01/15" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43331" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43718" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "source": "secalert@redhat.com", "url": "http://securitytracker.com/id?1025191" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:055" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:056" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/modrdn.c.diff?r1=1.170.2.8\u0026r2=1.170.2.9" }, { "source": "secalert@redhat.com", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6768" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.openldap.org/lists/openldap-announce/201102/msg00000.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2011-0347.html" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1100-1" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0665" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.novell.com/show_bug.cgi?id=674985" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680975" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66239" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/02/28/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/02/28/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/03/01/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/03/01/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43331" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43718" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1025191" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:055" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/modrdn.c.diff?r1=1.170.2.8\u0026r2=1.170.2.9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6768" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openldap.org/lists/openldap-announce/201102/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0347.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1100-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0665" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.novell.com/show_bug.cgi?id=674985" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680975" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66239" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-12-18 06:29
Modified
2025-04-20 01:37
Severity ?
Summary
contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.openldap.org/its/index.cgi/Incoming?id=8759 | Issue Tracking, Vendor Advisory | |
cve@mitre.org | https://kc.mcafee.com/corporate/index?page=content&id=SB10365 | Third Party Advisory | |
cve@mitre.org | https://www.oracle.com/security-alerts/cpuapr2022.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/its/index.cgi/Incoming?id=8759 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://kc.mcafee.com/corporate/index?page=content&id=SB10365 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuapr2022.html | Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
opensuse | leap | 15.0 | |
opensuse | leap | 15.1 | |
oracle | blockchain_platform | * | |
mcafee | policy_auditor | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "00A6E51B-52B6-4190-BB10-3622D575A7D5", "versionEndIncluding": "2.4.45", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0DBC938-A782-433F-8BF1-CA250C332AA7", "versionEndExcluding": "21.1.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB739B3A-20BB-4118-82DD-7ACFE5881FE2", "versionEndExcluding": "6.5.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation." }, { "lang": "es", "value": "contrib/slapd-modules/nops/nops.c en OpenLDAP hasta la versi\u00f3n 2.4.45, cuando el m\u00f3dulo nops y la capa memberof est\u00e1n activados, intenta liberar un b\u00fafer que se hab\u00eda asignado en la pila, lo que permite que los atacantes remotos provoquen una denegaci\u00f3n de servicio (cierre inesperado de slapd) mediante una operaci\u00f3n member MODDN." } ], "id": "CVE-2017-17740", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-12-18T06:29:00.397", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "http://www.openldap.org/its/index.cgi/Incoming?id=8759" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "http://www.openldap.org/its/index.cgi/Incoming?id=8759" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-01-02 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple buffer overflows in OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allow remote attackers to execute arbitrary code via (1) long -t or -r parameters to slurpd, (2) a malicious ldapfilter.conf file that is not properly handled by getfilter functions, (3) a malicious ldaptemplates.conf that causes an overflow in libldap, (4) a certain access control list that causes an overflow in slapd, or (5) a long generated filename for logging rejected replication requests.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000556 | ||
cve@mitre.org | http://www.ciac.org/ciac/bulletins/n-043.shtml | ||
cve@mitre.org | http://www.debian.org/security/2003/dsa-227 | Patch, Vendor Advisory | |
cve@mitre.org | http://www.linuxsecurity.com/advisories/gentoo_advisory-2704.html | ||
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDKSA-2003:006 | ||
cve@mitre.org | http://www.novell.com/linux/security/advisories/2002_047_openldap2.html | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2003-040.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/advisories/4827 | ||
cve@mitre.org | http://www.securityfocus.com/bid/6328 | ||
cve@mitre.org | http://www.turbolinux.com/security/TLSA-2003-5.txt | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/10800 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000556 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ciac.org/ciac/bulletins/n-043.shtml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2003/dsa-227 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.linuxsecurity.com/advisories/gentoo_advisory-2704.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2003:006 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/linux/security/advisories/2002_047_openldap2.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2003-040.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/advisories/4827 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/6328 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.turbolinux.com/security/TLSA-2003-5.txt | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/10800 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACC88BA3-7FA3-4585-8E84-A78B19CD19A3", "versionEndIncluding": "2.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allow remote attackers to execute arbitrary code via (1) long -t or -r parameters to slurpd, (2) a malicious ldapfilter.conf file that is not properly handled by getfilter functions, (3) a malicious ldaptemplates.conf that causes an overflow in libldap, (4) a certain access control list that causes an overflow in slapd, or (5) a long generated filename for logging rejected replication requests." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer en OpenLDAP22 (OpenLDAP 2) 2.2.0 y anteriores permiten a atacantes remotos ejecutar c\u00f3digo arbitrario." } ], "id": "CVE-2002-1378", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-01-02T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000556" }, { "source": "cve@mitre.org", "url": "http://www.ciac.org/ciac/bulletins/n-043.shtml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.debian.org/security/2003/dsa-227" }, { "source": "cve@mitre.org", "url": "http://www.linuxsecurity.com/advisories/gentoo_advisory-2704.html" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:006" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2002_047_openldap2.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-040.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/advisories/4827" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/6328" }, { "source": "cve@mitre.org", "url": "http://www.turbolinux.com/security/TLSA-2003-5.txt" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10800" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000556" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ciac.org/ciac/bulletins/n-043.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.debian.org/security/2003/dsa-227" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.linuxsecurity.com/advisories/gentoo_advisory-2704.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:006" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2002_047_openldap2.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-040.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/advisories/4827" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/6328" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.turbolinux.com/security/TLSA-2003-5.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10800" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-04-01 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
The default slapd configuration in the Debian openldap package 2.4.23-3 through 2.4.39-1.1 allows remote authenticated users to modify the user's permissions and other user attributes via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
security@debian.org | http://www.debian.org/security/2015/dsa-3209 | Vendor Advisory | |
security@debian.org | http://www.openwall.com/lists/oss-security/2015/03/29/2 | ||
security@debian.org | http://www.securityfocus.com/bid/73217 | ||
security@debian.org | http://www.ubuntu.com/usn/USN-2742-1 | ||
security@debian.org | https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761406 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2015/dsa-3209 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2015/03/29/2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/73217 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2742-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761406 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | 2.4.23 | |
openldap | openldap | 2.4.24 | |
openldap | openldap | 2.4.25 | |
openldap | openldap | 2.4.26 | |
openldap | openldap | 2.4.27 | |
openldap | openldap | 2.4.28 | |
openldap | openldap | 2.4.29 | |
openldap | openldap | 2.4.30 | |
openldap | openldap | 2.4.31 | |
openldap | openldap | 2.4.32 | |
openldap | openldap | 2.4.33 | |
openldap | openldap | 2.4.34 | |
openldap | openldap | 2.4.35 | |
openldap | openldap | 2.4.36 | |
openldap | openldap | 2.4.37 | |
openldap | openldap | 2.4.38 | |
openldap | openldap | 2.4.39 | |
debian | debian_linux | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:2.4.23:*:*:*:*:*:*:*", "matchCriteriaId": "5DE5D180-3972-40A0-ADAF-A4F3364D1381", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.24:*:*:*:*:*:*:*", "matchCriteriaId": "AD76F376-00D8-4917-BF68-6EECC316C331", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.25:*:*:*:*:*:*:*", "matchCriteriaId": "F7063C11-3BF5-4037-ADC3-0C7E9AF830B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.26:*:*:*:*:*:*:*", "matchCriteriaId": "CAE258EA-1B57-4189-AD5A-7E2ACF223167", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.27:*:*:*:*:*:*:*", "matchCriteriaId": "C492F5F5-A6FD-4BED-890A-79254138CC0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.28:*:*:*:*:*:*:*", "matchCriteriaId": "A6F7FDE8-2E54-4162-AA5F-D81253AAC8FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.29:*:*:*:*:*:*:*", "matchCriteriaId": "693E3145-FDDB-4780-886B-6D7FC7B2C5B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.30:*:*:*:*:*:*:*", "matchCriteriaId": "1BF32056-CC6A-4B2B-8FAA-F573445B9B99", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.31:*:*:*:*:*:*:*", "matchCriteriaId": "93B99338-4A1A-4483-8308-49BCCB325C30", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.32:*:*:*:*:*:*:*", "matchCriteriaId": "FE652CE3-E16B-4062-8253-F3FB52A651EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.33:*:*:*:*:*:*:*", "matchCriteriaId": "2A30ED6D-1DB8-4563-B131-1532F97F9694", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.34:*:*:*:*:*:*:*", "matchCriteriaId": "7764366D-29BB-4D75-A33C-7C17DA7496DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.35:*:*:*:*:*:*:*", "matchCriteriaId": "0A38D99B-370E-430A-A657-CD9FF72D0863", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.36:*:*:*:*:*:*:*", "matchCriteriaId": "AB3D3034-D938-402D-A02F-3F4005C438AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.37:*:*:*:*:*:*:*", "matchCriteriaId": "A7D979A0-3214-4DC6-A838-0AD2444CA5FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.38:*:*:*:*:*:*:*", "matchCriteriaId": "25B3EF5D-7889-4206-838C-E932AFCBE15D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.39:*:*:*:*:*:*:*", "matchCriteriaId": "6B20FA14-9F5B-425D-ACEF-A2348252C39A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The default slapd configuration in the Debian openldap package 2.4.23-3 through 2.4.39-1.1 allows remote authenticated users to modify the user\u0027s permissions and other user attributes via unspecified vectors." }, { "lang": "es", "value": "La configuraci\u00f3n por defecto slapd en el paquete Debian openldap 2.4.23-3 hasta 2.4.39-1.1 permite a usuarios remotos autenticados modificar los permisos de usuarios y otros atributos de usuarios a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2014-9713", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-04-01T14:59:00.067", "references": [ { "source": "security@debian.org", "tags": [ "Vendor Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3209" }, { "source": "security@debian.org", "url": "http://www.openwall.com/lists/oss-security/2015/03/29/2" }, { "source": "security@debian.org", "url": "http://www.securityfocus.com/bid/73217" }, { "source": "security@debian.org", "url": "http://www.ubuntu.com/usn/USN-2742-1" }, { "source": "security@debian.org", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761406" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3209" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2015/03/29/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/73217" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2742-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761406" } ], "sourceIdentifier": "security@debian.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-01-02 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allows remote or local attackers to execute arbitrary code when libldap reads the .ldaprc file within applications that are running with extra privileges.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.debian.org/security/2003/dsa-227 | Patch, Vendor Advisory | |
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDKSA-2003:006 | ||
cve@mitre.org | http://www.novell.com/linux/security/advisories/2002_047_openldap2.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2003/dsa-227 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2003:006 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/linux/security/advisories/2002_047_openldap2.html |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACC88BA3-7FA3-4585-8E84-A78B19CD19A3", "versionEndIncluding": "2.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allows remote or local attackers to execute arbitrary code when libldap reads the .ldaprc file within applications that are running with extra privileges." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades desconocidas en OpenLDAP2 (OpenLDAP2) 2.2.0 y anteriores, que no son desbordamientos de b\u00fafer como los descritos en CAN-2002-1378, permiten atacantes remotos o locales ejecutar c\u00f3digo arbitrario." } ], "id": "CVE-2002-1379", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-01-02T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.debian.org/security/2003/dsa-227" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:006" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2002_047_openldap2.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.debian.org/security/2003/dsa-227" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:006" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2002_047_openldap2.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-03-20 02:00
Modified
2025-04-11 00:51
Severity ?
Summary
chain.c in back-ldap in OpenLDAP 2.4.x before 2.4.24, when a master-slave configuration with a chain overlay and ppolicy_forward_updates (aka authentication-failure forwarding) is used, allows remote authenticated users to bypass external-program authentication by sending an invalid password to a slave server.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 | ||
secalert@redhat.com | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735 | ||
secalert@redhat.com | http://openwall.com/lists/oss-security/2011/02/24/12 | ||
secalert@redhat.com | http://openwall.com/lists/oss-security/2011/02/25/13 | ||
secalert@redhat.com | http://secunia.com/advisories/43331 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/43708 | ||
secalert@redhat.com | http://secunia.com/advisories/43718 | ||
secalert@redhat.com | http://security.gentoo.org/glsa/glsa-201406-36.xml | ||
secalert@redhat.com | http://securitytracker.com/id?1025188 | ||
secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2011:055 | ||
secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2011:056 | ||
secalert@redhat.com | http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-ldap/chain.c.diff?r1=1.76&r2=1.77&hideattic=1&sortbydate=0 | Patch | |
secalert@redhat.com | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6607 | ||
secalert@redhat.com | http://www.openldap.org/lists/openldap-announce/201102/msg00000.html | Patch | |
secalert@redhat.com | http://www.openldap.org/lists/openldap-technical/201004/msg00247.html | ||
secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2011-0346.html | ||
secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2011-0347.html | ||
secalert@redhat.com | http://www.ubuntu.com/usn/USN-1100-1 | ||
secalert@redhat.com | http://www.vupen.com/english/advisories/2011/0665 | Vendor Advisory | |
secalert@redhat.com | https://bugzilla.novell.com/show_bug.cgi?id=674985 | ||
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=680466 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2011/02/24/12 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2011/02/25/13 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43331 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43708 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43718 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201406-36.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1025188 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2011:055 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2011:056 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-ldap/chain.c.diff?r1=1.76&r2=1.77&hideattic=1&sortbydate=0 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6607 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/lists/openldap-announce/201102/msg00000.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/lists/openldap-technical/201004/msg00247.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-0346.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-0347.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-1100-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0665 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.novell.com/show_bug.cgi?id=674985 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=680466 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | 2.4.6 | |
openldap | openldap | 2.4.7 | |
openldap | openldap | 2.4.8 | |
openldap | openldap | 2.4.9 | |
openldap | openldap | 2.4.10 | |
openldap | openldap | 2.4.11 | |
openldap | openldap | 2.4.12 | |
openldap | openldap | 2.4.13 | |
openldap | openldap | 2.4.14 | |
openldap | openldap | 2.4.15 | |
openldap | openldap | 2.4.16 | |
openldap | openldap | 2.4.17 | |
openldap | openldap | 2.4.18 | |
openldap | openldap | 2.4.19 | |
openldap | openldap | 2.4.20 | |
openldap | openldap | 2.4.21 | |
openldap | openldap | 2.4.22 | |
openldap | openldap | 2.4.23 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:2.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "5EC66226-A597-4A4C-932F-F4A7BAE119C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "4AEABC84-7B67-4FD4-A891-E52C80DC881E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "340F673A-295E-4B75-A9D1-E785B0440BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "49203E99-71E2-49D4-91A0-65AAAA7DC18F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "473AEC48-FBBF-4BEB-8728-1FA80DD94807", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "7B0415EA-5F21-44C3-93F3-DDADBAA64449", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "16AFC655-E81F-4FDE-8030-9781A8B79E73", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "E99FB859-D023-4B2B-A709-05E83A46E2A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "8D2EEBC7-1FAF-43E2-A124-C387C02D9E2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "95D242E4-D5EB-4785-A6EF-60B1E8E2B0EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "F6FEDD9C-FDF7-456A-B06C-0A4A4443991D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "9245CDE2-B90A-4D47-BA20-A7869FF0A645", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "FB993E4D-E573-4495-97DE-465DDB2AA2DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.19:*:*:*:*:*:*:*", "matchCriteriaId": "D0F106A3-63D5-4D07-9440-6628DBA78BE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.20:*:*:*:*:*:*:*", "matchCriteriaId": "36CC03BC-DF34-43CD-90B0-27D23A1DD06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.21:*:*:*:*:*:*:*", "matchCriteriaId": "16C90FEE-527E-47F5-8840-517A55163D8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.22:*:*:*:*:*:*:*", "matchCriteriaId": "0FAEA812-BB47-47A3-A975-B3B8D30DBA36", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.23:*:*:*:*:*:*:*", "matchCriteriaId": "5DE5D180-3972-40A0-ADAF-A4F3364D1381", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "chain.c in back-ldap in OpenLDAP 2.4.x before 2.4.24, when a master-slave configuration with a chain overlay and ppolicy_forward_updates (aka authentication-failure forwarding) is used, allows remote authenticated users to bypass external-program authentication by sending an invalid password to a slave server." }, { "lang": "es", "value": "chain.c en back-ldap en OpenLDAP v2.4.x anteriores a v2.4.24 cuando se utiliza una configuraci\u00f3n maestro-esclavo con una superposici\u00f3n de la cadena y policy_forward_updates (tambi\u00e9n conocido como authentication-failure forwarding), permite a usuarios remotos autenticados eludir la autenticaci\u00f3n por programa externo mediante el env\u00edo de una contrase\u00f1a no v\u00e1lida para un servidor esclavo." } ], "id": "CVE-2011-1024", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-03-20T02:00:03.627", "references": [ { "source": "secalert@redhat.com", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "source": "secalert@redhat.com", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10735" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2011/02/24/12" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2011/02/25/13" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43331" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43708" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43718" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "source": "secalert@redhat.com", "url": "http://securitytracker.com/id?1025188" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:055" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:056" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-ldap/chain.c.diff?r1=1.76\u0026r2=1.77\u0026hideattic=1\u0026sortbydate=0" }, { "source": "secalert@redhat.com", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6607" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.openldap.org/lists/openldap-announce/201102/msg00000.html" }, { "source": "secalert@redhat.com", "url": "http://www.openldap.org/lists/openldap-technical/201004/msg00247.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2011-0346.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2011-0347.html" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1100-1" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0665" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.novell.com/show_bug.cgi?id=674985" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680466" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10735" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/02/24/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/02/25/13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43331" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43708" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43718" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1025188" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:055" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-ldap/chain.c.diff?r1=1.76\u0026r2=1.77\u0026hideattic=1\u0026sortbydate=0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6607" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openldap.org/lists/openldap-announce/201102/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openldap.org/lists/openldap-technical/201004/msg00247.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0346.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0347.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1100-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0665" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.novell.com/show_bug.cgi?id=674985" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680466" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-01-26 18:15
Modified
2024-11-21 05:29
Severity ?
Summary
A flaw was discovered in OpenLDAP before 2.4.57 leading in an assertion failure in slapd in the X.509 DN parsing in decode.c ber_next_element, resulting in denial of service.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/64 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/65 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/70 | Mailing List, Third Party Advisory | |
cve@mitre.org | https://bugs.openldap.org/show_bug.cgi?id=9423 | Issue Tracking, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/commit/8c1d96ee36ed98b32cd0e28b7069c7b8ea09d793 | Patch, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20210226-0002/ | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212529 | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212530 | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212531 | Third Party Advisory | |
cve@mitre.org | https://www.debian.org/security/2021/dsa-4845 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/64 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/65 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/70 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.openldap.org/show_bug.cgi?id=9423 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/commit/8c1d96ee36ed98b32cd0e28b7069c7b8ea09d793 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20210226-0002/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212529 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212530 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212531 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2021/dsa-4845 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
apple | mac_os_x | * | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | macos | * | |
apache | bookkeeper | 4.12.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "2192B6C0-FDC8-4609-B6C4-C78633717D07", "versionEndExcluding": "2.4.57", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E76BECE-0843-4B9F-90DE-7690764701B0", "versionEndExcluding": "10.14.6", "versionStartIncluding": "10.14.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*", "matchCriteriaId": "693E7DAE-BBF0-4D48-9F8A-20DDBD4AAC0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*", "matchCriteriaId": "A369D48B-6A0A-47AE-9513-D5E2E6F30931", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*", "matchCriteriaId": "510F8317-94DA-498E-927A-83D5F41AF54A", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*", "matchCriteriaId": "0D5D1970-6D2A-42CA-A203-42023D71730D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*", "matchCriteriaId": "C68AE52B-5139-40A4-AE9A-E752DBF07D1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*", "matchCriteriaId": "0FD3467D-7679-479F-9C0B-A93F7CD0929D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*", "matchCriteriaId": "D4C6098E-EDBD-4A85-8282-B2E9D9333872", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*", "matchCriteriaId": "518BB47B-DD76-4E8C-9F10-7EBC1E146191", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*", "matchCriteriaId": "63940A55-D851-46EB-9668-D82BEFC1FE95", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*", "matchCriteriaId": "68C7A97A-3801-44FA-96CA-10298FA39883", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*", "matchCriteriaId": "6D69914D-46C7-4A0E-A075-C863C1692D33", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*", "matchCriteriaId": "9CDB4476-B521-43E4-A129-8718A8E0A8CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*", "matchCriteriaId": "9D072B77-BE3F-4A2E-B66A-E2C8DC3781E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*", "matchCriteriaId": "A4A6BF78-B772-435C-AC1A-2199027CCF9E", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-003:*:*:*:*:*:*", "matchCriteriaId": "9A233DE4-D09A-4157-B852-E675889DD4C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*", "matchCriteriaId": "2C88BD98-46F5-447F-963A-FB9B167E31BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*", "matchCriteriaId": "C7A0615B-D958-4BBF-B53F-AA839A0FE845", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "617E79BC-1012-4778-BDE7-44A238CC8D7A", "versionEndExcluding": "11.4", "versionStartIncluding": "11.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:bookkeeper:4.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "FB293558-0DB0-4EEB-A91C-7B00A9FA634E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was discovered in OpenLDAP before 2.4.57 leading in an assertion failure in slapd in the X.509 DN parsing in decode.c ber_next_element, resulting in denial of service." }, { "lang": "es", "value": "Se detect\u00f3 un fallo en OpenLDAP versiones anteriores a 2.4.57, conllevando en un fallo de aserci\u00f3n en slapd en el an\u00e1lisis de DN X.509 en ber_next_element del archivo decode.c, resultando en una denegaci\u00f3n de servicio" } ], "id": "CVE-2020-36230", "lastModified": "2024-11-21T05:29:06.280", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-26T18:15:57.350", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9423" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/8c1d96ee36ed98b32cd0e28b7069c7b8ea09d793" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212529" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212530" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212531" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9423" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/8c1d96ee36ed98b32cd0e28b7069c7b8ea09d793" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4845" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-617" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-10-30 19:46
Modified
2025-04-09 00:30
Severity ?
Summary
OpenLDAP before 2.3.39 allows remote attackers to cause a denial of service (slapd crash) via an LDAP request with a malformed objectClasses attribute. NOTE: this has been reported as a double free, but the reports are inconsistent.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=440632 | ||
secalert@redhat.com | http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html | ||
secalert@redhat.com | http://secunia.com/advisories/27424 | Patch, Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/27587 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/27596 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/27683 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/27756 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/27868 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/29461 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/29682 | Vendor Advisory | |
secalert@redhat.com | http://security.gentoo.org/glsa/glsa-200803-28.xml | ||
secalert@redhat.com | http://support.apple.com/kb/HT3937 | ||
secalert@redhat.com | http://www.debian.org/security/2008/dsa-1541 | ||
secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDKSA-2007:215 | ||
secalert@redhat.com | http://www.novell.com/linux/security/advisories/2007_24_sr.html | ||
secalert@redhat.com | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5119 | ||
secalert@redhat.com | http://www.openldap.org/lists/openldap-announce/200710/msg00001.html | Patch | |
secalert@redhat.com | http://www.redhat.com/archives/fedora-package-announce/2007-November/msg00460.html | ||
secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2007-1037.html | ||
secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2007-1038.html | ||
secalert@redhat.com | http://www.securityfocus.com/bid/26245 | ||
secalert@redhat.com | http://www.securitytracker.com/id?1018924 | ||
secalert@redhat.com | http://www.ubuntu.com/usn/usn-551-1 | ||
secalert@redhat.com | http://www.vupen.com/english/advisories/2007/3645 | Vendor Advisory | |
secalert@redhat.com | http://www.vupen.com/english/advisories/2009/3184 | Vendor Advisory | |
secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10183 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=440632 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27424 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27587 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27596 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27683 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27756 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27868 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29461 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29682 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200803-28.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT3937 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2008/dsa-1541 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2007:215 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/linux/security/advisories/2007_24_sr.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5119 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/lists/openldap-announce/200710/msg00001.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/archives/fedora-package-announce/2007-November/msg00460.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2007-1037.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2007-1038.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/26245 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1018924 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-551-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/3645 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/3184 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10183 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | 1.0 | |
openldap | openldap | 1.0.1 | |
openldap | openldap | 1.0.2 | |
openldap | openldap | 1.0.3 | |
openldap | openldap | 1.1 | |
openldap | openldap | 1.1.0 | |
openldap | openldap | 1.1.1 | |
openldap | openldap | 1.1.2 | |
openldap | openldap | 1.1.3 | |
openldap | openldap | 1.1.4 | |
openldap | openldap | 1.2 | |
openldap | openldap | 1.2.0 | |
openldap | openldap | 1.2.1 | |
openldap | openldap | 1.2.2 | |
openldap | openldap | 1.2.3 | |
openldap | openldap | 1.2.4 | |
openldap | openldap | 1.2.5 | |
openldap | openldap | 1.2.6 | |
openldap | openldap | 1.2.7 | |
openldap | openldap | 1.2.8 | |
openldap | openldap | 1.2.9 | |
openldap | openldap | 1.2.10 | |
openldap | openldap | 1.2.11 | |
openldap | openldap | 1.2.12 | |
openldap | openldap | 1.2.13 | |
openldap | openldap | 2.0 | |
openldap | openldap | 2.0.0 | |
openldap | openldap | 2.0.1 | |
openldap | openldap | 2.0.2 | |
openldap | openldap | 2.0.3 | |
openldap | openldap | 2.0.4 | |
openldap | openldap | 2.0.5 | |
openldap | openldap | 2.0.6 | |
openldap | openldap | 2.0.7 | |
openldap | openldap | 2.0.8 | |
openldap | openldap | 2.0.9 | |
openldap | openldap | 2.0.10 | |
openldap | openldap | 2.0.11 | |
openldap | openldap | 2.0.11_9 | |
openldap | openldap | 2.0.11_11 | |
openldap | openldap | 2.0.11_11s | |
openldap | openldap | 2.0.12 | |
openldap | openldap | 2.0.13 | |
openldap | openldap | 2.0.14 | |
openldap | openldap | 2.0.15 | |
openldap | openldap | 2.0.16 | |
openldap | openldap | 2.0.17 | |
openldap | openldap | 2.0.18 | |
openldap | openldap | 2.0.19 | |
openldap | openldap | 2.0.20 | |
openldap | openldap | 2.0.21 | |
openldap | openldap | 2.0.22 | |
openldap | openldap | 2.0.23 | |
openldap | openldap | 2.0.24 | |
openldap | openldap | 2.0.25 | |
openldap | openldap | 2.0.26 | |
openldap | openldap | 2.0.27 | |
openldap | openldap | 2.1.2 | |
openldap | openldap | 2.1.3 | |
openldap | openldap | 2.1.4 | |
openldap | openldap | 2.1.5 | |
openldap | openldap | 2.1.6 | |
openldap | openldap | 2.1.7 | |
openldap | openldap | 2.1.8 | |
openldap | openldap | 2.1.9 | |
openldap | openldap | 2.1.10 | |
openldap | openldap | 2.1.11 | |
openldap | openldap | 2.1.12 | |
openldap | openldap | 2.1.13 | |
openldap | openldap | 2.1.14 | |
openldap | openldap | 2.1.15 | |
openldap | openldap | 2.1.16 | |
openldap | openldap | 2.1.17 | |
openldap | openldap | 2.1.18 | |
openldap | openldap | 2.1.19 | |
openldap | openldap | 2.1.20 | |
openldap | openldap | 2.1.21 | |
openldap | openldap | 2.1.22 | |
openldap | openldap | 2.1.23 | |
openldap | openldap | 2.1.24 | |
openldap | openldap | 2.1.25 | |
openldap | openldap | 2.1.26 | |
openldap | openldap | 2.1.27 | |
openldap | openldap | 2.1.28 | |
openldap | openldap | 2.1.29 | |
openldap | openldap | 2.1.30 | |
openldap | openldap | 2.1_.20 | |
openldap | openldap | 2.2.0 | |
openldap | openldap | 2.2.1 | |
openldap | openldap | 2.2.4 | |
openldap | openldap | 2.2.5 | |
openldap | openldap | 2.2.6 | |
openldap | openldap | 2.2.7 | |
openldap | openldap | 2.2.8 | |
openldap | openldap | 2.2.9 | |
openldap | openldap | 2.2.10 | |
openldap | openldap | 2.2.11 | |
openldap | openldap | 2.2.12 | |
openldap | openldap | 2.2.13 | |
openldap | openldap | 2.2.14 | |
openldap | openldap | 2.2.15 | |
openldap | openldap | 2.2.16 | |
openldap | openldap | 2.2.17 | |
openldap | openldap | 2.2.18 | |
openldap | openldap | 2.2.19 | |
openldap | openldap | 2.2.20 | |
openldap | openldap | 2.2.21 | |
openldap | openldap | 2.2.22 | |
openldap | openldap | 2.2.23 | |
openldap | openldap | 2.2.24 | |
openldap | openldap | 2.2.25 | |
openldap | openldap | 2.2.26 | |
openldap | openldap | 2.2.27 | |
openldap | openldap | 2.2.28_r2 | |
openldap | openldap | 2.2.29_rev_1.134 | |
openldap | openldap | 2.3.27_2.20061018 | |
openldap | openldap | 2.3.28_2.20061022 | |
openldap | openldap | 2.3.28_20061022 | |
openldap | openldap | 2.3.28_e1.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "086DC60F-F530-4515-8F3D-87F30DB9B322", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D538927-82D5-476E-9C85-2E9297316D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "2A904832-A6D6-45D4-B07C-79ED1FE47A80", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BB554A4-EEC2-4E17-9F32-27A580B9E389", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "191DB249-6A73-4561-8CCA-565D1525CB31", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "423F9D3A-6AA7-4D64-B872-2C867EEFC3DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "34A5D9A5-FB1D-4ACF-846A-4DB73196122C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "41400CE6-FA51-435C-93F7-B31FE42F18AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "6022ABEB-6825-4A5F-9884-74F94C2387F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "D2F15789-334D-460D-B5B3-FCC71087D107", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F77B1548-BB6D-4618-AE7B-E97F91A0AF5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1CC52235-72DA-4EF4-870A-AF25181DB56C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "B7064C52-1211-42B8-BF1F-C22D800AED07", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1CD95826-E44A-48C6-BAAB-77A905CAE6B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "FEEA6BB6-41FC-4F15-A95F-9B052F062454", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "E90766C1-6DBD-435C-85E1-920DAFA26D67", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "8CD13DAE-9588-4540-9183-FB80C507F985", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "526366F3-52F0-4816-A356-8F39B718C048", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "AC07AD0D-5DF9-41A4-8592-CEFF1842355D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "30017C56-42A9-4AF9-B5B3-7357E424F837", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "C8A51F38-3F5A-4F6D-93EE-776B5C2FF48F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "8DBEC27E-3220-42CE-B6CC-675F387CB506", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "E641DFFB-CBAF-4DCF-944F-443CFF836A53", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "A552E270-5C9C-40DC-B23D-97C8D995B8FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "53DF812C-E1F8-46D3-A072-3FBE696ADC33", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "552F2E25-DDB8-49A6-844A-8520696DBE5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "149EBFB7-B58F-4557-8E46-6DF88BB5E57E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "03D75A36-41C4-464F-8DC4-42C841ABC087", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C3EE919-D05C-4625-85FE-132F6F2B932C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "20D99A58-8D7E-4586-A9BF-1DD2A1DBB8D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DEBA0118-545E-4D7B-B819-34D157B2BA6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "67826609-F4CA-42CB-A5D0-B4503DDE2C92", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "61676BBD-95B8-44C9-BD66-79F00381BF86", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "719A9B1D-8E32-461F-BCD4-F72C6AD3E63E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "BFD73969-39F8-4849-AF6A-15ACDC2E4537", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DB8C1DD2-865A-4CF2-8137-3C40C01C9EAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "EE38B045-2224-43D1-8618-0885505865C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "5D26DAC5-EDBD-42D8-A877-1E6EA666D72B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.11_9:*:*:*:*:*:*:*", "matchCriteriaId": "E7AE325E-514C-40A1-AA56-D605377B5D90", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.11_11:*:*:*:*:*:*:*", "matchCriteriaId": "19397A11-E549-4F31-8007-8D5F3C0AABB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.11_11s:*:*:*:*:*:*:*", "matchCriteriaId": "1C659213-271D-4F22-AE14-A1646A612D2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67B0A2B6-C560-4AE0-BC79-3C7BC9163EE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "566406CE-368A-4799-A112-E5DFC5B333D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "E5CCC734-C15B-4D2B-BF83-F214F807C44E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "64796893-A90D-4B7D-BDBC-0087B57AF7E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "39914C6A-F4DB-43CC-B2B6-097365E55D34", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "5BFDD8F7-AAFD-453F-99A4-F9C0424EA791", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "0BFEEAA6-0B50-4644-A183-F5FEE7BD7EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "920FC1DB-95E2-4367-BF20-77D75BD7617D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "28E643F8-005A-4170-8275-8E4AB5C25209", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "C8A34C63-C17D-4026-B409-AA9A56529B87", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "4EA863B0-A6AB-44BD-84E8-B6C885EFFE10", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "24BFAEC7-6256-4B8F-83F5-60FBD1571936", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "83227371-ACC3-4217-BFF9-0A3AAADD50DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "734B8101-BEAC-40AB-81EA-2516CA20BC93", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "F0BD5253-FBC9-4384-8FC3-4E384582BE91", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "AA73658A-8834-4EC2-8D8F-3A7D1C834669", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "06BCE98E-546C-4852-BAE2-CF525A778B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "94284C78-255E-43B7-A33E-FBC25BABEA2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "4B298BAA-5584-4193-A3DB-31FBB0BD12B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "90604A40-A1F5-4F23-9B8C-472E8C794B59", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "1418EC80-2F42-4C1B-BA38-CA5BDEF83F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "9BC65FE9-348D-4468-A1EF-2AC5C673DB07", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "B3A400A0-B9D7-4CB2-82EA-49A599C2B30B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "65587514-46AB-4D70-B7C2-FBED7F78D13D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "7951BAAB-CB06-4F19-891A-E07E2B3C8701", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "82EC30A1-4150-44DC-89F7-5A64B8CC4A84", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "9DF04D97-A561-427B-9891-A1423B86F164", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "1E74B0C8-2D64-4BF2-B152-87909E3029EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "88F6CA0B-ED91-4085-8EE0-1F4256747621", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "B90657E7-D651-4E1E-8035-13A1F024E3C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "7BBE5477-BE27-412A-9BA9-9690F746B4F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "31300FA3-C57D-4564-927E-B06C0229BE8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "342E414D-8ED6-4E5A-88F0-57B5846A3EB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7C0BD0FD-BD80-4197-8479-BBB070DAB890", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "FC9CA4EF-61F1-407B-B2BF-B4AFD68F50BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "EB80C814-5B28-46CC-8237-70A558BF049C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "832AC063-6004-4A78-A964-45906361F9C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "E7C40DFD-4FB8-40AA-ABA4-194DED1241A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "992733F2-000F-4E27-8D19-AF18543E57BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "B36E0E49-D908-4A19-A621-6E7FB3E59A18", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "74779CA2-6741-4053-8C23-98A1F938B264", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "930DAA18-113F-42B0-8382-8579575D238F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "98F50353-EBFB-4DE5-8D35-80C672A12E41", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "18A4F43F-8E4F-4203-B640-02BBB28052A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "28063C54-EE5E-44EC-8D47-E880C2BB45BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.1_.20:*:*:*:*:*:*:*", "matchCriteriaId": "E8BCFC49-6505-4713-A06C-A64782A34414", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BAE01BA8-416B-4419-99E5-81C1FA404FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C2F45B8-B9FB-4D43-B2DD-98413F5F2B85", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "0F611094-500A-4306-8C15-4878135FA45D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "32096DE5-3F2C-4FF7-BDC6-E316DFDC97A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FE197F27-CB34-4B0E-A30A-C9C87295AAD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "10A4256F-EC89-425F-86FD-B0DE243EBF2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "4A34127E-507D-4F72-9F93-B23F91DB0F53", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "B7A2D5D9-3E7E-4420-A338-B05A8C077229", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "C76EF100-3328-4C70-A123-50A4ECFF539E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "1DCE7803-E652-4A17-8EEB-B91C81CF48E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "DA5CB439-5F0B-40CF-8564-6875CAC74FCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB5E524E-1B71-46B5-A14E-C2342851C0FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "FE103338-9AE7-4230-A8B2-09273004B4D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "12621DED-ABF1-47A7-961C-E6DE1F6302AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "C8026929-4845-46E4-A6F8-E60CA498201B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "DE01BD68-D6DC-4220-A3F0-71961CEA205F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "68DE3F16-E171-4FA3-9B00-3F944A4E7604", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "63F7B718-0E5C-4900-A5DE-D59D37EC79D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "8B8805A0-F543-450D-82E9-EE923904E2A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.21:*:*:*:*:*:*:*", "matchCriteriaId": "58779045-578C-41D5-9CAE-D6F48C91654C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "969F18EF-067A-47BA-9DC4-9FA69D9DCBB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.23:*:*:*:*:*:*:*", "matchCriteriaId": "E12766AB-2AFE-4BBD-8B80-8BEA932ABDFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.24:*:*:*:*:*:*:*", "matchCriteriaId": "6C2C7514-8BB4-4B8A-A5AF-D4A26B232597", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.25:*:*:*:*:*:*:*", "matchCriteriaId": "64C0AB94-ED91-4218-8F97-862BA57D1CC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.26:*:*:*:*:*:*:*", "matchCriteriaId": "E2FF5C05-0A64-416C-8346-EE5FF4AA14F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.27:*:*:*:*:*:*:*", "matchCriteriaId": "5C081128-2846-4257-B822-10AADE54899D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.28_r2:*:*:*:*:*:*:*", "matchCriteriaId": "45FF1704-80C6-439E-B145-7F5B14B62E46", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.29_rev_1.134:*:*:*:*:*:*:*", "matchCriteriaId": "7D92C2EA-951D-485B-8653-528926E55557", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.27_2.20061018:*:*:*:*:*:*:*", "matchCriteriaId": "548AE94B-CFF5-4416-812B-B1F60C2799F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.28_2.20061022:*:*:*:*:*:*:*", "matchCriteriaId": "55399875-38F4-486B-88F2-E17F00C901CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.28_20061022:*:*:*:*:*:*:*", "matchCriteriaId": "8971D9E4-C4B7-4DFF-B20D-0520D484E692", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.28_e1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "86033CDB-D9A3-4872-9FF7-789F2332923B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenLDAP before 2.3.39 allows remote attackers to cause a denial of service (slapd crash) via an LDAP request with a malformed objectClasses attribute. NOTE: this has been reported as a double free, but the reports are inconsistent." }, { "lang": "es", "value": "OpenLDAP versiones anteriores a 2.3.39, permite a atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo de slapd) por medio de una petici\u00f3n LDAP con un atributo objectClasses malformado. NOTA: esto ha sido reportado como doble liberaci\u00f3n, pero los reportes son incoherentes." } ], "id": "CVE-2007-5707", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-10-30T19:46:00.000", "references": [ { "source": "secalert@redhat.com", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=440632" }, { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/27424" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27587" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27596" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27683" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27756" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27868" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29461" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29682" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-200803-28.xml" }, { "source": "secalert@redhat.com", "url": "http://support.apple.com/kb/HT3937" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2008/dsa-1541" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:215" }, { "source": "secalert@redhat.com", "url": "http://www.novell.com/linux/security/advisories/2007_24_sr.html" }, { "source": "secalert@redhat.com", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5119" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.openldap.org/lists/openldap-announce/200710/msg00001.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/archives/fedora-package-announce/2007-November/msg00460.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2007-1037.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2007-1038.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/26245" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1018924" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/usn-551-1" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/3645" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3184" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10183" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=440632" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/27424" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27587" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27596" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27683" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27756" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27868" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29461" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29682" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200803-28.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT3937" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2008/dsa-1541" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:215" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2007_24_sr.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5119" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openldap.org/lists/openldap-announce/200710/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/archives/fedora-package-announce/2007-November/msg00460.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2007-1037.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2007-1038.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/26245" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018924" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-551-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/3645" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3184" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10183" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-06-17 03:41
Modified
2025-04-11 00:51
Severity ?
Summary
libraries/libldap/tls_m.c in OpenLDAP, possibly 2.4.31 and earlier, when using the Mozilla NSS backend, always uses the default cipher suite even when TLSCipherSuite is set, which might cause OpenLDAP to use weaker ciphers than intended and make it easier for remote attackers to obtain sensitive information.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=676309 | ||
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2012-1151.html | ||
secalert@redhat.com | http://seclists.org/fulldisclosure/2019/Dec/26 | ||
secalert@redhat.com | http://security.gentoo.org/glsa/glsa-201406-36.xml | ||
secalert@redhat.com | http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commitdiff%3Bh=2c2bb2e | ||
secalert@redhat.com | http://www.openldap.org/its/index.cgi?findid=7285 | ||
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2012/06/05/4 | ||
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2012/06/06/1 | ||
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2012/06/06/2 | ||
secalert@redhat.com | http://www.securityfocus.com/bid/53823 | ||
secalert@redhat.com | http://www.securitytracker.com/id?1027127 | ||
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=825875 | ||
secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/76099 | ||
secalert@redhat.com | https://seclists.org/bugtraq/2019/Dec/23 | ||
secalert@redhat.com | https://support.apple.com/kb/HT210788 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=676309 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2012-1151.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2019/Dec/26 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201406-36.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commitdiff%3Bh=2c2bb2e | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/its/index.cgi?findid=7285 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2012/06/05/4 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2012/06/06/1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2012/06/06/2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/53823 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1027127 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=825875 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/76099 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2019/Dec/23 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT210788 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
openldap | openldap | 2.4.6 | |
openldap | openldap | 2.4.7 | |
openldap | openldap | 2.4.8 | |
openldap | openldap | 2.4.9 | |
openldap | openldap | 2.4.10 | |
openldap | openldap | 2.4.11 | |
openldap | openldap | 2.4.12 | |
openldap | openldap | 2.4.13 | |
openldap | openldap | 2.4.14 | |
openldap | openldap | 2.4.15 | |
openldap | openldap | 2.4.16 | |
openldap | openldap | 2.4.17 | |
openldap | openldap | 2.4.18 | |
openldap | openldap | 2.4.19 | |
openldap | openldap | 2.4.20 | |
openldap | openldap | 2.4.21 | |
openldap | openldap | 2.4.22 | |
openldap | openldap | 2.4.23 | |
openldap | openldap | 2.4.24 | |
openldap | openldap | 2.4.25 | |
openldap | openldap | 2.4.26 | |
openldap | openldap | 2.4.27 | |
openldap | openldap | 2.4.28 | |
openldap | openldap | 2.4.29 | |
openldap | openldap | 2.4.30 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "D85D909A-036F-41CB-ADA1-A374562241F8", "versionEndIncluding": "2.4.31", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "5EC66226-A597-4A4C-932F-F4A7BAE119C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "4AEABC84-7B67-4FD4-A891-E52C80DC881E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "340F673A-295E-4B75-A9D1-E785B0440BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "49203E99-71E2-49D4-91A0-65AAAA7DC18F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "473AEC48-FBBF-4BEB-8728-1FA80DD94807", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "7B0415EA-5F21-44C3-93F3-DDADBAA64449", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "16AFC655-E81F-4FDE-8030-9781A8B79E73", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "E99FB859-D023-4B2B-A709-05E83A46E2A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "8D2EEBC7-1FAF-43E2-A124-C387C02D9E2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "95D242E4-D5EB-4785-A6EF-60B1E8E2B0EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "F6FEDD9C-FDF7-456A-B06C-0A4A4443991D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "9245CDE2-B90A-4D47-BA20-A7869FF0A645", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "FB993E4D-E573-4495-97DE-465DDB2AA2DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.19:*:*:*:*:*:*:*", "matchCriteriaId": "D0F106A3-63D5-4D07-9440-6628DBA78BE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.20:*:*:*:*:*:*:*", "matchCriteriaId": "36CC03BC-DF34-43CD-90B0-27D23A1DD06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.21:*:*:*:*:*:*:*", "matchCriteriaId": "16C90FEE-527E-47F5-8840-517A55163D8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.22:*:*:*:*:*:*:*", "matchCriteriaId": "0FAEA812-BB47-47A3-A975-B3B8D30DBA36", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.23:*:*:*:*:*:*:*", "matchCriteriaId": "5DE5D180-3972-40A0-ADAF-A4F3364D1381", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.24:*:*:*:*:*:*:*", "matchCriteriaId": "AD76F376-00D8-4917-BF68-6EECC316C331", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.25:*:*:*:*:*:*:*", "matchCriteriaId": "F7063C11-3BF5-4037-ADC3-0C7E9AF830B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.26:*:*:*:*:*:*:*", "matchCriteriaId": "CAE258EA-1B57-4189-AD5A-7E2ACF223167", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.27:*:*:*:*:*:*:*", "matchCriteriaId": "C492F5F5-A6FD-4BED-890A-79254138CC0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.28:*:*:*:*:*:*:*", "matchCriteriaId": "A6F7FDE8-2E54-4162-AA5F-D81253AAC8FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.29:*:*:*:*:*:*:*", "matchCriteriaId": "693E3145-FDDB-4780-886B-6D7FC7B2C5B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.30:*:*:*:*:*:*:*", "matchCriteriaId": "1BF32056-CC6A-4B2B-8FAA-F573445B9B99", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "libraries/libldap/tls_m.c in OpenLDAP, possibly 2.4.31 and earlier, when using the Mozilla NSS backend, always uses the default cipher suite even when TLSCipherSuite is set, which might cause OpenLDAP to use weaker ciphers than intended and make it easier for remote attackers to obtain sensitive information." }, { "lang": "es", "value": "libraries/libldap/tls_m.c en OpenLDAP, posiblemente v2.4.31 y anteriores, cuando se utiliza el \"backend\" de Mozilla NSS, siempre utiliza la suite de cifrado por defecto incluso cuando TLSCipherSuite est\u00e1 establecido, lo que podr\u00eda provocar que OpenLDAP use algoritmos de cifrado m\u00e1s d\u00e9biles que los esperados y que sea m\u00e1s f\u00e1cil para que los atacantes remotos obtener informaci\u00f3n sensible." } ], "id": "CVE-2012-2668", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-06-17T03:41:41.030", "references": [ { "source": "secalert@redhat.com", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=676309" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2012-1151.html" }, { "source": "secalert@redhat.com", "url": "http://seclists.org/fulldisclosure/2019/Dec/26" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "source": "secalert@redhat.com", "url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commitdiff%3Bh=2c2bb2e" }, { "source": "secalert@redhat.com", "url": "http://www.openldap.org/its/index.cgi?findid=7285" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/06/05/4" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/06/06/1" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/06/06/2" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/53823" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1027127" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=825875" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76099" }, { "source": "secalert@redhat.com", "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "source": "secalert@redhat.com", "url": "https://support.apple.com/kb/HT210788" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=676309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2012-1151.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2019/Dec/26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commitdiff%3Bh=2c2bb2e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openldap.org/its/index.cgi?findid=7285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/06/05/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/06/06/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/06/06/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53823" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1027127" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=825875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76099" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/kb/HT210788" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-05-18 12:15
Modified
2024-11-21 05:18
Severity ?
Summary
A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP’s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://seclists.org/fulldisclosure/2021/Feb/14 | Mailing List, Third Party Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1899675 | Issue Tracking, Patch, Third Party Advisory | |
secalert@redhat.com | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
secalert@redhat.com | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
secalert@redhat.com | https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | https://security.netapp.com/advisory/ntap-20210716-0003/ | Third Party Advisory | |
secalert@redhat.com | https://support.apple.com/kb/HT212147 | Third Party Advisory | |
secalert@redhat.com | https://www.debian.org/security/2020/dsa-4792 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/Feb/14 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1899675 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20210716-0003/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212147 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2020/dsa-4792 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
apple | mac_os_x | * | |
apple | mac_os_x | * | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.15.7 | |
apple | mac_os_x | 10.15.7 | |
apple | mac_os_x | 10.15.7 | |
apple | mac_os_x | 10.15.7 | |
apple | macos | * | |
redhat | jboss_core_services | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "21588D06-FD1B-4053-9FCE-2D4AE811119C", "versionEndExcluding": "2.4.56", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E76BECE-0843-4B9F-90DE-7690764701B0", "versionEndExcluding": "10.14.6", "versionStartIncluding": "10.14.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB8A73F8-3074-4B32-B9F6-343B6B1988C5", "versionEndExcluding": "10.15.7", "versionStartIncluding": "10.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*", "matchCriteriaId": "693E7DAE-BBF0-4D48-9F8A-20DDBD4AAC0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*", "matchCriteriaId": "A369D48B-6A0A-47AE-9513-D5E2E6F30931", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*", "matchCriteriaId": "510F8317-94DA-498E-927A-83D5F41AF54A", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*", "matchCriteriaId": "0D5D1970-6D2A-42CA-A203-42023D71730D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*", "matchCriteriaId": "C68AE52B-5139-40A4-AE9A-E752DBF07D1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*", "matchCriteriaId": "0FD3467D-7679-479F-9C0B-A93F7CD0929D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*", "matchCriteriaId": "D4C6098E-EDBD-4A85-8282-B2E9D9333872", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*", "matchCriteriaId": "518BB47B-DD76-4E8C-9F10-7EBC1E146191", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*", "matchCriteriaId": "63940A55-D851-46EB-9668-D82BEFC1FE95", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*", "matchCriteriaId": "68C7A97A-3801-44FA-96CA-10298FA39883", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*", "matchCriteriaId": "6D69914D-46C7-4A0E-A075-C863C1692D33", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*", "matchCriteriaId": "9CDB4476-B521-43E4-A129-8718A8E0A8CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*", "matchCriteriaId": "A654B8A2-FC30-4171-B0BB-366CD7ED4B6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*", "matchCriteriaId": "7FD7176C-F4D1-43A7-9E49-BA92CA0D9980", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*", "matchCriteriaId": "2703DE0B-8A9E-4A9D-9AE8-028E22BF47CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*", "matchCriteriaId": "C1C795B9-E58D-467C-83A8-2D45C792292F", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "76BFC9D4-7D15-4C23-A54A-3F5A0B8BC542", "versionEndExcluding": "11.0.1", "versionStartIncluding": "11.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B453CF7-9AA6-4B94-A003-BF7AE0B82F53", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP\u2019s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability." }, { "lang": "es", "value": "Se encontr\u00f3 un fallo en OpenLDAP.\u0026#xa0;Este fallo permite a un atacante que puede enviar un paquete malicioso a ser procesado por el servidor slapd de OpenLDAP, para desencadenar un fallo de aserci\u00f3n.\u0026#xa0;La mayor amenaza de esta vulnerabilidad es la disponibilidad del sistema" } ], "id": "CVE-2020-25709", "lastModified": "2024-11-21T05:18:32.437", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-05-18T12:15:07.673", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Feb/14" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899675" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210716-0003/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212147" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4792" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Feb/14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899675" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210716-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212147" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4792" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-617" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-12-07 20:59
Modified
2025-04-12 10:46
Severity ?
Summary
The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2015-2131.html | Third Party Advisory | |
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html | Third Party Advisory | |
secalert@redhat.com | http://www.securitytracker.com/id/1034221 | Broken Link, Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1238322 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2015-2131.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1034221 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1238322 | Issue Tracking, Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
oracle | linux | 7 | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_eus | 7.3 | |
redhat | enterprise_linux_eus | 7.4 | |
redhat | enterprise_linux_eus | 7.5 | |
redhat | enterprise_linux_eus | 7.6 | |
redhat | enterprise_linux_eus | 7.7 | |
redhat | enterprise_linux_hpc_node | 7.0 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_server_aus | 7.3 | |
redhat | enterprise_linux_server_aus | 7.4 | |
redhat | enterprise_linux_server_aus | 7.6 | |
redhat | enterprise_linux_server_aus | 7.7 | |
redhat | enterprise_linux_server_tus | 7.3 | |
redhat | enterprise_linux_server_tus | 7.6 | |
redhat | enterprise_linux_server_tus | 7.7 | |
redhat | enterprise_linux_workstation | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "A94A47B9-02DC-4085-AB11-90AB2753B5D2", "versionEndExcluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*", "matchCriteriaId": "44B8FEDF-6CB0-46E9-9AD7-4445B001C158", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "807C024A-F8E8-4B48-A349-4C68CD252CA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "F96E3779-F56A-45FF-BB3D-4980527D721E", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "0CF73560-2F5B-4723-A8A1-9AADBB3ADA00", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "5BF3C7A5-9117-42C7-BEA1-4AA378A582EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "83737173-E12E-4641-BC49-0BD84A6B29D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C84489B-B08C-4854-8A12-D01B6E45CF79", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "7431ABC1-9252-419E-8CC1-311B41360078", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "17F256A9-D3B9-4C72-B013-4EFD878BFEA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors." }, { "lang": "es", "value": "La funci\u00f3n nss_parse_ciphers en libraries/libldap/tls_m.c en OpenLDAP no analiza adecuadamente cadenas de cifrado en modo multiclave de estilo OpenSSL, lo que podr\u00eda provocar el uso de un cifrado m\u00e1s d\u00e9bil que el previsto y permitir a atacantes remotos tener un impacto no especificado a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2015-3276", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2015-12-07T20:59:03.023", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2131.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034221" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1238322" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2131.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034221" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1238322" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-01-26 18:15
Modified
2024-11-21 05:29
Severity ?
Summary
A flaw was discovered in OpenLDAP before 2.4.57 leading to a double free and slapd crash in the saslAuthzTo processing, resulting in denial of service.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/64 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/65 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://seclists.org/fulldisclosure/2021/May/70 | Mailing List, Third Party Advisory | |
cve@mitre.org | https://bugs.openldap.org/show_bug.cgi?id=9412 | Issue Tracking, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65 | Patch, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26 | Patch, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439 | Patch, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8 | Patch, Vendor Advisory | |
cve@mitre.org | https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20210226-0002/ | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212529 | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212530 | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT212531 | Third Party Advisory | |
cve@mitre.org | https://www.debian.org/security/2021/dsa-4845 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/64 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/65 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/May/70 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.openldap.org/show_bug.cgi?id=9412 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20210226-0002/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212529 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212530 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212531 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2021/dsa-4845 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
apple | macos | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "2192B6C0-FDC8-4609-B6C4-C78633717D07", "versionEndExcluding": "2.4.57", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "617E79BC-1012-4778-BDE7-44A238CC8D7A", "versionEndExcluding": "11.4", "versionStartIncluding": "11.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was discovered in OpenLDAP before 2.4.57 leading to a double free and slapd crash in the saslAuthzTo processing, resulting in denial of service." }, { "lang": "es", "value": "Se detect\u00f3 un fallo en OpenLDAP versiones anteriores a 2.4.57, conllevando a una doble liberaci\u00f3n y un bloqueo de slapd en el procesamiento de saslAuthzTo, resultando en una denegaci\u00f3n de servicio" } ], "id": "CVE-2020-36225", "lastModified": "2024-11-21T05:29:05.157", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-26T18:15:57.037", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9412" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212529" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212530" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212531" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4845" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/64" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/65" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9412" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4845" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-415" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-30 22:15
Modified
2025-01-10 22:15
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://seclists.org/fulldisclosure/2023/Jul/47 | Mailing List | |
secalert@redhat.com | http://seclists.org/fulldisclosure/2023/Jul/48 | Mailing List | |
secalert@redhat.com | http://seclists.org/fulldisclosure/2023/Jul/52 | Mailing List | |
secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2023-2953 | Third Party Advisory | |
secalert@redhat.com | https://bugs.openldap.org/show_bug.cgi?id=9904 | Issue Tracking, Vendor Advisory | |
secalert@redhat.com | https://security.netapp.com/advisory/ntap-20230703-0005/ | Third Party Advisory | |
secalert@redhat.com | https://support.apple.com/kb/HT213843 | Third Party Advisory | |
secalert@redhat.com | https://support.apple.com/kb/HT213844 | Third Party Advisory | |
secalert@redhat.com | https://support.apple.com/kb/HT213845 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2023/Jul/47 | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2023/Jul/48 | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2023/Jul/52 | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/CVE-2023-2953 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.openldap.org/show_bug.cgi?id=9904 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20230703-0005/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT213843 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT213844 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT213845 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | 2.4 | |
redhat | enterprise_linux | 8.0 | |
redhat | enterprise_linux | 9.0 | |
apple | macos | * | |
apple | macos | * | |
apple | macos | * | |
netapp | active_iq_unified_manager | - | |
netapp | clustered_data_ontap | - | |
netapp | ontap_tools | - | |
netapp | h300s_firmware | - | |
netapp | h300s | - | |
netapp | h500s_firmware | - | |
netapp | h500s | - | |
netapp | h700s_firmware | - | |
netapp | h700s | - | |
netapp | h410s_firmware | - | |
netapp | h410s | - | |
netapp | h410c_firmware | - | |
netapp | h410c | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "AF7B8F72-1490-482D-80EB-D08637F2E037", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB5312D6-AEEA-4548-B3EF-B07B46168475", "versionEndExcluding": "11.7.9", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B763A1F-C183-4728-B593-67558FD9FC36", "versionEndExcluding": "12.6.8", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D701507-146E-4E5B-8C32-60E797E46627", "versionEndExcluding": "13.5", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FE996B1-6951-4F85-AA58-B99A379D2163", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:ontap_tools:-:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "CBCC384C-5DF0-41AB-B17B-6E9B6CAE8065", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function." } ], "id": "CVE-2023-2953", "lastModified": "2025-01-10T22:15:23.557", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-05-30T22:15:10.613", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "http://seclists.org/fulldisclosure/2023/Jul/47" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "http://seclists.org/fulldisclosure/2023/Jul/48" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "http://seclists.org/fulldisclosure/2023/Jul/52" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2023-2953" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9904" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20230703-0005/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213843" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213844" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213845" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://seclists.org/fulldisclosure/2023/Jul/47" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://seclists.org/fulldisclosure/2023/Jul/48" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://seclists.org/fulldisclosure/2023/Jul/52" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2023-2953" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.openldap.org/show_bug.cgi?id=9904" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20230703-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213843" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213844" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213845" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "secalert@redhat.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2010-07-28 12:48
Modified
2025-04-11 00:51
Severity ?
Summary
The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.
References
▶ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 | Third Party Advisory | |
cret@cert.org | http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html | Mailing List | |
cret@cert.org | http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html | Mailing List | |
cret@cert.org | http://secunia.com/advisories/40639 | Broken Link, Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/40677 | Broken Link, Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/40687 | Broken Link, Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/42787 | Broken Link | |
cret@cert.org | http://security.gentoo.org/glsa/glsa-201406-36.xml | Third Party Advisory | |
cret@cert.org | http://support.apple.com/kb/HT4435 | Issue Tracking | |
cret@cert.org | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6570 | Exploit | |
cret@cert.org | http://www.redhat.com/support/errata/RHSA-2010-0542.html | Broken Link | |
cret@cert.org | http://www.redhat.com/support/errata/RHSA-2010-0543.html | Broken Link | |
cret@cert.org | http://www.securityfocus.com/archive/1/515545/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
cret@cert.org | http://www.securityfocus.com/bid/41770 | Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry | |
cret@cert.org | http://www.securitytracker.com/id?1024221 | Broken Link, Third Party Advisory, VDB Entry | |
cret@cert.org | http://www.vmware.com/security/advisories/VMSA-2011-0001.html | Third Party Advisory | |
cret@cert.org | http://www.vupen.com/english/advisories/2010/1849 | Broken Link, Vendor Advisory | |
cret@cert.org | http://www.vupen.com/english/advisories/2010/1858 | Broken Link, Vendor Advisory | |
cret@cert.org | http://www.vupen.com/english/advisories/2011/0025 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/40639 | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/40677 | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/40687 | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42787 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201406-36.xml | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT4435 | Issue Tracking | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6570 | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2010-0542.html | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2010-0543.html | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/515545/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/41770 | Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024221 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2011-0001.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1849 | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1858 | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0025 | Broken Link |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:2.4.22:*:*:*:*:*:*:*", "matchCriteriaId": "0FAEA812-BB47-47A3-A975-B3B8D30DBA36", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "13771B15-CD71-472A-BE56-718B87D5825D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4BDE707D-A1F4-4829-843E-F6633BB84D6D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "1B42AB65-443B-4655-BAEA-4EB4A43D9509", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB1D490-FDFB-468C-942D-0BC828B5D3F0", "versionEndExcluding": "10.6.5", "versionStartIncluding": "10.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "65FA6685-8E50-40CA-A61D-649AECC5F48F", "versionEndExcluding": "10.6.5", "versionStartIncluding": "10.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite." }, { "lang": "es", "value": "La funci\u00f3n slap_modrdn2mods en modrdn.c en OpenLDAP v2.4.22 no comprueba el valor de retorno de la llamada a la funci\u00f3n smr_normalize, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (fallo de segmentaci\u00f3n) y posiblemente ejecuci\u00f3n de comandos de su elecci\u00f3n a trav\u00e9s de una llamada a modrdn call con una cadena RDN que contenga secuencias UTF-8 inv\u00e1lidas, lo que provocar\u00e1 la liberaci\u00f3n de un puntero no v\u00e1lido ni inicializado en la funci\u00f3n slap_mods_free, como se demostr\u00f3 usando la suite de test Codenomicon LDAPv3." } ], "id": "CVE-2010-0211", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2010-07-28T12:48:51.620", "references": [ { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "source": "cret@cert.org", "tags": [ "Mailing List" ], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "source": "cret@cert.org", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" }, { "source": "cret@cert.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/40639" }, { "source": "cret@cert.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/40677" }, { "source": "cret@cert.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/40687" }, { "source": "cret@cert.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/42787" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "source": "cret@cert.org", "tags": [ "Issue Tracking" ], "url": "http://support.apple.com/kb/HT4435" }, { "source": "cret@cert.org", "tags": [ "Exploit" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6570" }, { "source": "cret@cert.org", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0542.html" }, { "source": "cret@cert.org", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0543.html" }, { "source": "cret@cert.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/515545/100/0/threaded" }, { "source": "cret@cert.org", "tags": [ "Broken Link", "Exploit", "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/41770" }, { "source": "cret@cert.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1024221" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0001.html" }, { "source": "cret@cert.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1849" }, { "source": "cret@cert.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1858" }, { "source": "cret@cert.org", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2011/0025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/40639" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/40677" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/40687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/42787" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "http://support.apple.com/kb/HT4435" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6570" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0542.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0543.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/515545/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Exploit", "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/41770" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1024221" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1849" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1858" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2011/0025" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-252" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-03-20 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
ldbm_back_exop_passwd in the back-ldbm backend in passwd.c for OpenLDAP 2.1.12 and earlier, when the slap_passwd_parse function does not return LDAP_SUCCESS, attempts to free an uninitialized pointer, which allows remote attackers to cause a denial of service (segmentation fault).
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000685 | Broken Link, Patch | |
cve@mitre.org | http://secunia.com/advisories/11261 | Broken Link, Patch | |
cve@mitre.org | http://secunia.com/advisories/9203 | Broken Link, Patch | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200403-12.xml | Third Party Advisory | |
cve@mitre.org | http://www.openldap.org/its/index.cgi?findid=2390 | Issue Tracking, Patch | |
cve@mitre.org | http://www.osvdb.org/17000 | Broken Link | |
cve@mitre.org | http://www.securityfocus.com/bid/7656 | Broken Link, Patch, Third Party Advisory, VDB Entry | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/12520 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000685 | Broken Link, Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/11261 | Broken Link, Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/9203 | Broken Link, Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200403-12.xml | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/its/index.cgi?findid=2390 | Issue Tracking, Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/17000 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/7656 | Broken Link, Patch, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/12520 | Third Party Advisory, VDB Entry |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "D81456D0-8603-493B-B75C-F5C659557DEA", "versionEndIncluding": "2.1.12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ldbm_back_exop_passwd in the back-ldbm backend in passwd.c for OpenLDAP 2.1.12 and earlier, when the slap_passwd_parse function does not return LDAP_SUCCESS, attempts to free an uninitialized pointer, which allows remote attackers to cause a denial of service (segmentation fault)." } ], "evaluatorSolution": "This was fixed in OpenLDAP version 2.1.17.", "id": "CVE-2003-1201", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-03-20T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Patch" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000685" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Patch" ], "url": "http://secunia.com/advisories/11261" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Patch" ], "url": "http://secunia.com/advisories/9203" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200403-12.xml" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "http://www.openldap.org/its/index.cgi?findid=2390" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/17000" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/7656" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12520" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Patch" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000685" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Patch" ], "url": "http://secunia.com/advisories/11261" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Patch" ], "url": "http://secunia.com/advisories/9203" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200403-12.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "http://www.openldap.org/its/index.cgi?findid=2390" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/17000" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/7656" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12520" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-824" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-02-12 16:59
Modified
2025-04-12 10:46
Severity ?
Summary
Double free vulnerability in the get_vrFilter function in servers/slapd/filter.c in OpenLDAP 2.4.40 allows remote attackers to cause a denial of service (crash) via a crafted search query with a matched values control.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html | ||
cve@mitre.org | http://secunia.com/advisories/62787 | ||
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2015:073 | ||
cve@mitre.org | http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commit%3Bh=2f1a2dd329b91afe561cd06b872d09630d4edb6a | ||
cve@mitre.org | http://www.openldap.org/its/?findid=8046 | ||
cve@mitre.org | http://www.openwall.com/lists/oss-security/2015/02/07/3 | ||
cve@mitre.org | https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776991 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/100938 | ||
cve@mitre.org | https://support.apple.com/HT204659 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/62787 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2015:073 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commit%3Bh=2f1a2dd329b91afe561cd06b872d09630d4edb6a | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/its/?findid=8046 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2015/02/07/3 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776991 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/100938 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/HT204659 |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:2.4.40:*:*:*:*:*:*:*", "matchCriteriaId": "43B01F94-261C-4718-A82D-28DAE9B67936", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:10.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "D35FAC77-A0DD-4AF9-AA9E-A4B170842D2D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Double free vulnerability in the get_vrFilter function in servers/slapd/filter.c in OpenLDAP 2.4.40 allows remote attackers to cause a denial of service (crash) via a crafted search query with a matched values control." }, { "lang": "es", "value": "Vulnerabilidad de liberaci\u00f3n doble en la funci\u00f3n get_vrFilter en servers/slapd/filter.c en OpenLDAP 2.4.40 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de una consulta de b\u00fasqueda manipulada con control de valores coincidentes." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/415.html\"\u003eCWE - CWE-415: Double Free\u003c/a\u003e", "id": "CVE-2015-1546", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-02-12T16:59:07.097", "references": [ { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62787" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:073" }, { "source": "cve@mitre.org", "url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commit%3Bh=2f1a2dd329b91afe561cd06b872d09630d4edb6a" }, { "source": "cve@mitre.org", "url": "http://www.openldap.org/its/?findid=8046" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2015/02/07/3" }, { "source": "cve@mitre.org", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776991" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100938" }, { "source": "cve@mitre.org", "url": "https://support.apple.com/HT204659" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62787" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:073" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commit%3Bh=2f1a2dd329b91afe561cd06b872d09630d4edb6a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openldap.org/its/?findid=8046" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2015/02/07/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776991" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100938" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/HT204659" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-06-29 19:55
Modified
2025-04-11 00:51
Severity ?
Summary
slapd in OpenLDAP before 2.4.30 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an LDAP search query with attrsOnly set to true, which causes empty attributes to be returned.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2012-0899.html | ||
secalert@redhat.com | http://seclists.org/fulldisclosure/2019/Dec/26 | ||
secalert@redhat.com | http://secunia.com/advisories/48372 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/49607 | Vendor Advisory | |
secalert@redhat.com | http://security.gentoo.org/glsa/glsa-201406-36.xml | ||
secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2012:130 | ||
secalert@redhat.com | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7143 | Vendor Advisory | |
secalert@redhat.com | http://www.openldap.org/software/release/changes.html | ||
secalert@redhat.com | http://www.securityfocus.com/bid/52404 | ||
secalert@redhat.com | https://seclists.org/bugtraq/2019/Dec/23 | ||
secalert@redhat.com | https://support.apple.com/kb/HT210788 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2012-0899.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2019/Dec/26 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/48372 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/49607 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201406-36.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2012:130 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7143 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/software/release/changes.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/52404 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2019/Dec/23 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT210788 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
openldap | openldap | 2.4.6 | |
openldap | openldap | 2.4.7 | |
openldap | openldap | 2.4.8 | |
openldap | openldap | 2.4.9 | |
openldap | openldap | 2.4.10 | |
openldap | openldap | 2.4.11 | |
openldap | openldap | 2.4.12 | |
openldap | openldap | 2.4.13 | |
openldap | openldap | 2.4.14 | |
openldap | openldap | 2.4.15 | |
openldap | openldap | 2.4.16 | |
openldap | openldap | 2.4.17 | |
openldap | openldap | 2.4.18 | |
openldap | openldap | 2.4.19 | |
openldap | openldap | 2.4.20 | |
openldap | openldap | 2.4.21 | |
openldap | openldap | 2.4.22 | |
openldap | openldap | 2.4.23 | |
openldap | openldap | 2.4.24 | |
openldap | openldap | 2.4.25 | |
openldap | openldap | 2.4.26 | |
openldap | openldap | 2.4.27 | |
openldap | openldap | 2.4.28 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE48D5AB-B4B1-4159-8C2D-6F5CB097F16F", "versionEndIncluding": "2.4.29", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "5EC66226-A597-4A4C-932F-F4A7BAE119C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "4AEABC84-7B67-4FD4-A891-E52C80DC881E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "340F673A-295E-4B75-A9D1-E785B0440BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "49203E99-71E2-49D4-91A0-65AAAA7DC18F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "473AEC48-FBBF-4BEB-8728-1FA80DD94807", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "7B0415EA-5F21-44C3-93F3-DDADBAA64449", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "16AFC655-E81F-4FDE-8030-9781A8B79E73", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "E99FB859-D023-4B2B-A709-05E83A46E2A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "8D2EEBC7-1FAF-43E2-A124-C387C02D9E2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "95D242E4-D5EB-4785-A6EF-60B1E8E2B0EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "F6FEDD9C-FDF7-456A-B06C-0A4A4443991D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "9245CDE2-B90A-4D47-BA20-A7869FF0A645", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "FB993E4D-E573-4495-97DE-465DDB2AA2DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.19:*:*:*:*:*:*:*", "matchCriteriaId": "D0F106A3-63D5-4D07-9440-6628DBA78BE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.20:*:*:*:*:*:*:*", "matchCriteriaId": "36CC03BC-DF34-43CD-90B0-27D23A1DD06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.21:*:*:*:*:*:*:*", "matchCriteriaId": "16C90FEE-527E-47F5-8840-517A55163D8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.22:*:*:*:*:*:*:*", "matchCriteriaId": "0FAEA812-BB47-47A3-A975-B3B8D30DBA36", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.23:*:*:*:*:*:*:*", "matchCriteriaId": "5DE5D180-3972-40A0-ADAF-A4F3364D1381", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.24:*:*:*:*:*:*:*", "matchCriteriaId": "AD76F376-00D8-4917-BF68-6EECC316C331", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.25:*:*:*:*:*:*:*", "matchCriteriaId": "F7063C11-3BF5-4037-ADC3-0C7E9AF830B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.26:*:*:*:*:*:*:*", "matchCriteriaId": "CAE258EA-1B57-4189-AD5A-7E2ACF223167", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.27:*:*:*:*:*:*:*", "matchCriteriaId": "C492F5F5-A6FD-4BED-890A-79254138CC0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.28:*:*:*:*:*:*:*", "matchCriteriaId": "A6F7FDE8-2E54-4162-AA5F-D81253AAC8FA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "slapd in OpenLDAP before 2.4.30 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an LDAP search query with attrsOnly set to true, which causes empty attributes to be returned." }, { "lang": "es", "value": "slapd de OpenLDAP anteriores a 2.4.30 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (fallo de aserci\u00f3n y finalizaci\u00f3n del demonio) a trav\u00e9s de una petici\u00f3n de b\u00fasqueda LDAP con attrsOnly asignado a \"true\", lo que provoca que atributos vac\u00edos sean devueltos." } ], "id": "CVE-2012-1164", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-06-29T19:55:03.327", "references": [ { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2012-0899.html" }, { "source": "secalert@redhat.com", "url": "http://seclists.org/fulldisclosure/2019/Dec/26" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/48372" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49607" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:130" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7143" }, { "source": "secalert@redhat.com", "url": "http://www.openldap.org/software/release/changes.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/52404" }, { "source": "secalert@redhat.com", "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "source": "secalert@redhat.com", "url": "https://support.apple.com/kb/HT210788" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2012-0899.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2019/Dec/26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/48372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49607" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openldap.org/software/release/changes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/52404" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/kb/HT210788" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-01-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
slapd in OpenLDAP 2.0 through 2.0.19 allows local users, and anonymous users before 2.0.8, to conduct a "replace" action on access controls without any values, which causes OpenLDAP to delete non-mandatory attributes that would otherwise be protected by ACLs.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-001.0.txt | ||
cve@mitre.org | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000459 | ||
cve@mitre.org | http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:013 | ||
cve@mitre.org | http://www.openldap.org/lists/openldap-announce/200201/msg00002.html | Vendor Advisory | |
cve@mitre.org | http://www.osvdb.org/5395 | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2002-014.html | ||
cve@mitre.org | http://www.securityfocus.com/bid/3945 | ||
cve@mitre.org | http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0201-020 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/7978 | ||
af854a3a-2127-422b-91ae-364da2661108 | ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-001.0.txt | ||
af854a3a-2127-422b-91ae-364da2661108 | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000459 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:013 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/lists/openldap-announce/200201/msg00002.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/5395 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2002-014.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/3945 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0201-020 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/7978 |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D5CCDD0-2D88-4E8A-AD04-7E6101F6690C", "versionEndIncluding": "2.0.19", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "552F2E25-DDB8-49A6-844A-8520696DBE5B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "29B186E5-7C2F-466E-AA4A-8F2B618F8A14", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D46E093-1C68-43BB-B281-12117EC8DE0F", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "E562907F-D915-4030-847A-3C6834A80D4E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "slapd in OpenLDAP 2.0 through 2.0.19 allows local users, and anonymous users before 2.0.8, to conduct a \"replace\" action on access controls without any values, which causes OpenLDAP to delete non-mandatory attributes that would otherwise be protected by ACLs." }, { "lang": "es", "value": "sldap en OpenLDAP 2.0 a 2.0.19 permite a usuarios locales, y a usuarios an\u00f3nimos en versiones anteriores a 2.0.8, llevar a cabo una acci\u00f3n \"replace\" en controles de acceso sin valores, lo que causa que OpenLDAP borre atributos no mandatorios que de otra forma estar\u00edan protegidos por listas de control de accesso (ACL)." } ], "id": "CVE-2002-0045", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-01-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-001.0.txt" }, { "source": "cve@mitre.org", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000459" }, { "source": "cve@mitre.org", "url": "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:013" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.openldap.org/lists/openldap-announce/200201/msg00002.html" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/5395" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2002-014.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/3945" }, { "source": "cve@mitre.org", "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0201-020" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7978" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-001.0.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000459" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:013" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.openldap.org/lists/openldap-announce/200201/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/5395" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2002-014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/3945" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0201-020" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7978" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-05-29 16:29
Modified
2025-04-20 01:37
Severity ?
Summary
servers/slapd/back-mdb/search.c in OpenLDAP through 2.4.44 is prone to a double free vulnerability. A user with access to search the directory can crash slapd by issuing a search including the Paged Results control with a page size of 0.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.debian.org/security/2017/dsa-3868 | Third Party Advisory | |
cve@mitre.org | http://www.openldap.org/its/?findid=8655 | Exploit, Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/98736 | Broken Link | |
cve@mitre.org | http://www.securitytracker.com/id/1038591 | Broken Link | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2017:1852 | Third Party Advisory | |
cve@mitre.org | https://bugs.debian.org/863563 | Issue Tracking, Patch, Third Party Advisory | |
cve@mitre.org | https://kc.mcafee.com/corporate/index?page=content&id=SB10365 | Third Party Advisory | |
cve@mitre.org | https://www.oracle.com/security-alerts/cpuapr2022.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2017/dsa-3868 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/its/?findid=8655 | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/98736 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038591 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:1852 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.debian.org/863563 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://kc.mcafee.com/corporate/index?page=content&id=SB10365 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuapr2022.html | Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
debian | debian_linux | 8.0 | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_eus | 7.4 | |
redhat | enterprise_linux_eus | 7.5 | |
redhat | enterprise_linux_eus | 7.6 | |
redhat | enterprise_linux_eus | 7.7 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_server_aus | 7.4 | |
redhat | enterprise_linux_server_aus | 7.6 | |
redhat | enterprise_linux_server_aus | 7.7 | |
redhat | enterprise_linux_server_tus | 7.6 | |
redhat | enterprise_linux_server_tus | 7.7 | |
redhat | enterprise_linux_workstation | 7.0 | |
mcafee | policy_auditor | * | |
oracle | blockchain_platform | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E460604-92F0-4116-96C0-2E2D7B2E14CA", "versionEndIncluding": "2.4.44", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "F96E3779-F56A-45FF-BB3D-4980527D721E", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "0CF73560-2F5B-4723-A8A1-9AADBB3ADA00", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "5BF3C7A5-9117-42C7-BEA1-4AA378A582EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "83737173-E12E-4641-BC49-0BD84A6B29D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "7431ABC1-9252-419E-8CC1-311B41360078", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "17F256A9-D3B9-4C72-B013-4EFD878BFEA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB739B3A-20BB-4118-82DD-7ACFE5881FE2", "versionEndExcluding": "6.5.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0DBC938-A782-433F-8BF1-CA250C332AA7", "versionEndExcluding": "21.1.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "servers/slapd/back-mdb/search.c in OpenLDAP through 2.4.44 is prone to a double free vulnerability. A user with access to search the directory can crash slapd by issuing a search including the Paged Results control with a page size of 0." }, { "lang": "es", "value": "servers/slapd/back-mdb/search.c en OpenLDAP hasta la versi\u00f3n 2.4.44 es propenso a una doble vulnerabilidad de liberaci\u00f3n de memoria. Un usuario con acceso para buscar en el directorio puede hacer que slapd deje de funcionar al emitir una b\u00fasqueda que incluya el control Paged Results con un tama\u00f1o de p\u00e1gina de 0." } ], "id": "CVE-2017-9287", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-05-29T16:29:00.273", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-3868" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.openldap.org/its/?findid=8655" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.securityfocus.com/bid/98736" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.securitytracker.com/id/1038591" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1852" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.debian.org/863563" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-3868" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.openldap.org/its/?findid=8655" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.securityfocus.com/bid/98736" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.securitytracker.com/id/1038591" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1852" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.debian.org/863563" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-415" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-02-12 16:59
Modified
2025-04-12 10:46
Severity ?
Summary
The deref_parseCtrl function in servers/slapd/overlays/deref.c in OpenLDAP 2.4.13 through 2.4.40 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an empty attribute list in a deref control in a search request.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html | ||
cve@mitre.org | http://seclists.org/fulldisclosure/2019/Dec/26 | ||
cve@mitre.org | http://secunia.com/advisories/62787 | ||
cve@mitre.org | http://www.debian.org/security/2015/dsa-3209 | ||
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2015:073 | ||
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2015:074 | ||
cve@mitre.org | http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commit%3Bh=c32e74763f77675b9e144126e375977ed6dc562c | ||
cve@mitre.org | http://www.openldap.org/its/?findid=8027 | Exploit, Vendor Advisory | |
cve@mitre.org | http://www.openwall.com/lists/oss-security/2015/02/07/3 | ||
cve@mitre.org | http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html | ||
cve@mitre.org | http://www.securityfocus.com/bid/72519 | ||
cve@mitre.org | http://www.securitytracker.com/id/1032399 | ||
cve@mitre.org | https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776988 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/100937 | ||
cve@mitre.org | https://seclists.org/bugtraq/2019/Dec/23 | ||
cve@mitre.org | https://support.apple.com/HT204659 | ||
cve@mitre.org | https://support.apple.com/kb/HT210788 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2019/Dec/26 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/62787 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2015/dsa-3209 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2015:073 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2015:074 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commit%3Bh=c32e74763f77675b9e144126e375977ed6dc562c | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/its/?findid=8027 | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2015/02/07/3 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/72519 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032399 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776988 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/100937 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2019/Dec/23 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/HT204659 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT210788 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | 2.4.13 | |
openldap | openldap | 2.4.14 | |
openldap | openldap | 2.4.15 | |
openldap | openldap | 2.4.16 | |
openldap | openldap | 2.4.17 | |
openldap | openldap | 2.4.18 | |
openldap | openldap | 2.4.19 | |
openldap | openldap | 2.4.20 | |
openldap | openldap | 2.4.21 | |
openldap | openldap | 2.4.22 | |
openldap | openldap | 2.4.23 | |
openldap | openldap | 2.4.24 | |
openldap | openldap | 2.4.25 | |
openldap | openldap | 2.4.26 | |
openldap | openldap | 2.4.27 | |
openldap | openldap | 2.4.28 | |
openldap | openldap | 2.4.29 | |
openldap | openldap | 2.4.30 | |
openldap | openldap | 2.4.31 | |
openldap | openldap | 2.4.32 | |
openldap | openldap | 2.4.33 | |
openldap | openldap | 2.4.34 | |
openldap | openldap | 2.4.35 | |
openldap | openldap | 2.4.36 | |
openldap | openldap | 2.4.37 | |
openldap | openldap | 2.4.38 | |
openldap | openldap | 2.4.39 | |
openldap | openldap | 2.4.40 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:2.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "E99FB859-D023-4B2B-A709-05E83A46E2A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "8D2EEBC7-1FAF-43E2-A124-C387C02D9E2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "95D242E4-D5EB-4785-A6EF-60B1E8E2B0EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "F6FEDD9C-FDF7-456A-B06C-0A4A4443991D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "9245CDE2-B90A-4D47-BA20-A7869FF0A645", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "FB993E4D-E573-4495-97DE-465DDB2AA2DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.19:*:*:*:*:*:*:*", "matchCriteriaId": "D0F106A3-63D5-4D07-9440-6628DBA78BE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.20:*:*:*:*:*:*:*", "matchCriteriaId": "36CC03BC-DF34-43CD-90B0-27D23A1DD06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.21:*:*:*:*:*:*:*", "matchCriteriaId": "16C90FEE-527E-47F5-8840-517A55163D8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.22:*:*:*:*:*:*:*", "matchCriteriaId": "0FAEA812-BB47-47A3-A975-B3B8D30DBA36", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.23:*:*:*:*:*:*:*", "matchCriteriaId": "5DE5D180-3972-40A0-ADAF-A4F3364D1381", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.24:*:*:*:*:*:*:*", "matchCriteriaId": "AD76F376-00D8-4917-BF68-6EECC316C331", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.25:*:*:*:*:*:*:*", "matchCriteriaId": "F7063C11-3BF5-4037-ADC3-0C7E9AF830B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.26:*:*:*:*:*:*:*", "matchCriteriaId": "CAE258EA-1B57-4189-AD5A-7E2ACF223167", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.27:*:*:*:*:*:*:*", "matchCriteriaId": "C492F5F5-A6FD-4BED-890A-79254138CC0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.28:*:*:*:*:*:*:*", "matchCriteriaId": "A6F7FDE8-2E54-4162-AA5F-D81253AAC8FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.29:*:*:*:*:*:*:*", "matchCriteriaId": "693E3145-FDDB-4780-886B-6D7FC7B2C5B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.30:*:*:*:*:*:*:*", "matchCriteriaId": "1BF32056-CC6A-4B2B-8FAA-F573445B9B99", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.31:*:*:*:*:*:*:*", "matchCriteriaId": "93B99338-4A1A-4483-8308-49BCCB325C30", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.32:*:*:*:*:*:*:*", "matchCriteriaId": "FE652CE3-E16B-4062-8253-F3FB52A651EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.33:*:*:*:*:*:*:*", "matchCriteriaId": "2A30ED6D-1DB8-4563-B131-1532F97F9694", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.34:*:*:*:*:*:*:*", "matchCriteriaId": "7764366D-29BB-4D75-A33C-7C17DA7496DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.35:*:*:*:*:*:*:*", "matchCriteriaId": "0A38D99B-370E-430A-A657-CD9FF72D0863", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.36:*:*:*:*:*:*:*", "matchCriteriaId": "AB3D3034-D938-402D-A02F-3F4005C438AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.37:*:*:*:*:*:*:*", "matchCriteriaId": "A7D979A0-3214-4DC6-A838-0AD2444CA5FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.38:*:*:*:*:*:*:*", "matchCriteriaId": "25B3EF5D-7889-4206-838C-E932AFCBE15D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.39:*:*:*:*:*:*:*", "matchCriteriaId": "6B20FA14-9F5B-425D-ACEF-A2348252C39A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.40:*:*:*:*:*:*:*", "matchCriteriaId": "43B01F94-261C-4718-A82D-28DAE9B67936", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The deref_parseCtrl function in servers/slapd/overlays/deref.c in OpenLDAP 2.4.13 through 2.4.40 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an empty attribute list in a deref control in a search request." }, { "lang": "es", "value": "La funci\u00f3n deref_parseCtrl en servers/slapd/overlays/deref.c en OpenLDAP 2.4.13 hasta 2.4.40 permite a atacantes remotos causar una denegaci\u00f3n de servicio (referencia a puntero nulo y ca\u00edda) a trav\u00e9s de una lista de atributos vac\u00eda en un control de referencia en una solicitud de b\u00fasqueda." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/476.html\"\u003eCWE-476: NULL Pointer Dereference\u003c/a\u003e", "id": "CVE-2015-1545", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-02-12T16:59:06.143", "references": [ { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2019/Dec/26" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62787" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2015/dsa-3209" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:073" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:074" }, { "source": "cve@mitre.org", "url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commit%3Bh=c32e74763f77675b9e144126e375977ed6dc562c" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.openldap.org/its/?findid=8027" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2015/02/07/3" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/72519" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1032399" }, { "source": "cve@mitre.org", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776988" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100937" }, { "source": "cve@mitre.org", "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "source": "cve@mitre.org", "url": "https://support.apple.com/HT204659" }, { "source": "cve@mitre.org", "url": "https://support.apple.com/kb/HT210788" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2019/Dec/26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62787" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3209" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:073" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:074" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commit%3Bh=c32e74763f77675b9e144126e375977ed6dc562c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.openldap.org/its/?findid=8027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2015/02/07/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/72519" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1032399" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776988" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100937" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/HT204659" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/kb/HT210788" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Note that the deref overlay is not enabled by default, so this vulnerability only affects sites that have explicitly configured their servers to load and enable the overlay. Since this overlay has never been documented, there are no sites outside of the OpenLDAP developer community with a legitimate reason to enable this module.", "lastModified": "2015-02-25T11:33:12.727", "organization": "openldap.org" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-09-07 00:04
Modified
2025-04-03 01:03
Severity ?
Summary
slapd in OpenLDAP before 2.3.25 allows remote authenticated users with selfwrite Access Control List (ACL) privileges to modify arbitrary Distinguished Names (DN).
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc | ||
cve@mitre.org | http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html | ||
cve@mitre.org | http://secunia.com/advisories/21721 | Patch, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/22219 | ||
cve@mitre.org | http://secunia.com/advisories/22273 | ||
cve@mitre.org | http://secunia.com/advisories/22300 | ||
cve@mitre.org | http://secunia.com/advisories/25098 | ||
cve@mitre.org | http://secunia.com/advisories/25628 | ||
cve@mitre.org | http://secunia.com/advisories/25676 | ||
cve@mitre.org | http://secunia.com/advisories/25894 | ||
cve@mitre.org | http://secunia.com/advisories/26909 | ||
cve@mitre.org | http://secunia.com/advisories/27706 | ||
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200711-23.xml | ||
cve@mitre.org | http://securitytracker.com/id?1016783 | ||
cve@mitre.org | http://support.avaya.com/elmodocs2/security/ASA-2007-232.htm | ||
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDKSA-2006:171 | ||
cve@mitre.org | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4587 | Patch | |
cve@mitre.org | http://www.openldap.org/lists/openldap-announce/200608/msg00000.html | Patch | |
cve@mitre.org | http://www.openldap.org/software/release/changes.html | Patch | |
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2007-0310.html | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2007-0430.html | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/447395/100/200/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/19832 | Patch | |
cve@mitre.org | http://www.trustix.org/errata/2006/0055 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2007/2186 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2007/3229 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/28772 | ||
cve@mitre.org | https://issues.rpath.com/browse/RPL-667 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9618 | ||
af854a3a-2127-422b-91ae-364da2661108 | ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21721 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/22219 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/22273 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/22300 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25098 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25628 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25676 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25894 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26909 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27706 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200711-23.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1016783 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://support.avaya.com/elmodocs2/security/ASA-2007-232.htm | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2006:171 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4587 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/lists/openldap-announce/200608/msg00000.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/software/release/changes.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2007-0310.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2007-0430.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/447395/100/200/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/19832 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.trustix.org/errata/2006/0055 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/2186 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/3229 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/28772 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://issues.rpath.com/browse/RPL-667 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9618 |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:2.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "28E643F8-005A-4170-8275-8E4AB5C25209", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "C8A34C63-C17D-4026-B409-AA9A56529B87", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "4EA863B0-A6AB-44BD-84E8-B6C885EFFE10", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "24BFAEC7-6256-4B8F-83F5-60FBD1571936", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "83227371-ACC3-4217-BFF9-0A3AAADD50DD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "slapd in OpenLDAP before 2.3.25 allows remote authenticated users with selfwrite Access Control List (ACL) privileges to modify arbitrary Distinguished Names (DN)." }, { "lang": "es", "value": "slapd en OpenLDAP anterior a 2.3.25 permite a un atacante remoto validar a usuarios con privilegios del Access Control List del selfwrite (ACL) para modificar los Distinguished Names (DN) de su elecci\u00f3n." } ], "id": "CVE-2006-4600", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-09-07T00:04:00.000", "references": [ { "source": "cve@mitre.org", "url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc" }, { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21721" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/22219" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/22273" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/22300" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/25098" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/25628" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/25676" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/25894" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/26909" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/27706" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200711-23.xml" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016783" }, { "source": "cve@mitre.org", "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-232.htm" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:171" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4587" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.openldap.org/lists/openldap-announce/200608/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.openldap.org/software/release/changes.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2007-0310.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2007-0430.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/447395/100/200/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/19832" }, { "source": "cve@mitre.org", "url": "http://www.trustix.org/errata/2006/0055" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2186" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/3229" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28772" }, { "source": "cve@mitre.org", "url": "https://issues.rpath.com/browse/RPL-667" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9618" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21721" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/22219" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/22273" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/22300" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/25098" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/25628" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/25676" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/25894" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26909" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/27706" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200711-23.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016783" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-232.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:171" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4587" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openldap.org/lists/openldap-announce/200608/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openldap.org/software/release/changes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2007-0310.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2007-0430.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/447395/100/200/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/19832" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.trustix.org/errata/2006/0055" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2186" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/3229" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28772" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.rpath.com/browse/RPL-667" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9618" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=205826\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttp://www.redhat.com/security/updates/classification/\n\nThe risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 2.1 which is in maintenance mode.", "lastModified": "2007-09-05T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-11-07 18:07
Modified
2025-04-09 00:30
Severity ?
Summary
OpenLDAP before 2.3.29 allows remote attackers to cause a denial of service (daemon crash) via LDAP BIND requests with long authcid names, which triggers an assertion failure.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://gleg.net/downloads/VULNDISCO_META_FREE.tar.gz | Broken Link, Exploit | |
cve@mitre.org | http://gleg.net/vulndisco_meta.shtml | Broken Link, Exploit | |
cve@mitre.org | http://secunia.com/advisories/22750 | Broken Link, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/22953 | Broken Link, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/22996 | Broken Link, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/23125 | Broken Link, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/23133 | Broken Link, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/23152 | Broken Link, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/23170 | Broken Link, Vendor Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200611-25.xml | Third Party Advisory | |
cve@mitre.org | http://securityreason.com/securityalert/1831 | Broken Link | |
cve@mitre.org | http://securitytracker.com/id?1017166 | Broken Link, Exploit, Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDKSA-2006:208 | Broken Link | |
cve@mitre.org | http://www.novell.com/linux/security/advisories/2006_72_openldap2.html | Broken Link | |
cve@mitre.org | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4740 | Exploit, Issue Tracking | |
cve@mitre.org | http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.033-openldap.html | Broken Link | |
cve@mitre.org | http://www.securityfocus.com/archive/1/450728/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securityfocus.com/bid/20939 | Broken Link, Exploit, Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.trustix.org/errata/2006/0066/ | Broken Link | |
cve@mitre.org | http://www.ubuntu.com/usn/usn-384-1 | Third Party Advisory | |
cve@mitre.org | http://www.vupen.com/english/advisories/2006/4379 | Broken Link, Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/30076 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://issues.rpath.com/browse/RPL-820 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://gleg.net/downloads/VULNDISCO_META_FREE.tar.gz | Broken Link, Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://gleg.net/vulndisco_meta.shtml | Broken Link, Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/22750 | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/22953 | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/22996 | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/23125 | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/23133 | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/23152 | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/23170 | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200611-25.xml | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securityreason.com/securityalert/1831 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1017166 | Broken Link, Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2006:208 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/linux/security/advisories/2006_72_openldap2.html | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4740 | Exploit, Issue Tracking | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.033-openldap.html | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/450728/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/20939 | Broken Link, Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.trustix.org/errata/2006/0066/ | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-384-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2006/4379 | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/30076 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://issues.rpath.com/browse/RPL-820 | Broken Link |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | * | |
canonical | ubuntu_linux | 5.10 | |
canonical | ubuntu_linux | 6.06 | |
canonical | ubuntu_linux | 6.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "matchCriteriaId": "4FD9DE52-674C-497D-AB66-E1CF8A1D143C", "versionEndExcluding": "2.3.29", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*", "matchCriteriaId": "0FA3A32E-445A-4D39-A8D5-75F5370AD23D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*", "matchCriteriaId": "23E304C9-F780-4358-A58D-1E4C93977704", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenLDAP before 2.3.29 allows remote attackers to cause a denial of service (daemon crash) via LDAP BIND requests with long authcid names, which triggers an assertion failure." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el paquete openldap-2.2.29-1 de OpenLDAP en Fedora Core 4 (FC4), permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) mediante cierta combinaci\u00f3n de peticiones LDAP BIND que disparan un fallo de aserci\u00f3n." } ], "id": "CVE-2006-5779", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2006-11-07T18:07:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Exploit" ], "url": "http://gleg.net/downloads/VULNDISCO_META_FREE.tar.gz" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Exploit" ], "url": "http://gleg.net/vulndisco_meta.shtml" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/22750" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/22953" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/22996" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/23125" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/23133" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/23152" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/23170" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200611-25.xml" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://securityreason.com/securityalert/1831" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1017166" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:208" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.novell.com/linux/security/advisories/2006_72_openldap2.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4740" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.033-openldap.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/450728/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/20939" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.trustix.org/errata/2006/0066/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/usn-384-1" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/4379" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30076" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://issues.rpath.com/browse/RPL-820" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Exploit" ], "url": "http://gleg.net/downloads/VULNDISCO_META_FREE.tar.gz" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Exploit" ], "url": "http://gleg.net/vulndisco_meta.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/22750" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/22953" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/22996" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/23125" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/23133" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/23152" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/23170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200611-25.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://securityreason.com/securityalert/1831" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1017166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:208" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.novell.com/linux/security/advisories/2006_72_openldap2.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.033-openldap.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/450728/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/20939" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.trustix.org/errata/2006/0066/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/usn-384-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/4379" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30076" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://issues.rpath.com/browse/RPL-820" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Not Vulnerable. The OpenLDAP versions shipped with Red Hat Enterprise Linux 4 and earlier do not contain the vulnerable code in question. Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "lastModified": "2007-03-14T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-617" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-03-20 02:00
Modified
2025-04-11 00:51
Severity ?
Summary
bind.cpp in back-ndb in OpenLDAP 2.4.x before 2.4.24 does not require authentication for the root Distinguished Name (DN), which allows remote attackers to bypass intended access restrictions via an arbitrary password.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 | ||
secalert@redhat.com | http://openwall.com/lists/oss-security/2011/02/24/12 | ||
secalert@redhat.com | http://openwall.com/lists/oss-security/2011/02/25/13 | ||
secalert@redhat.com | http://secunia.com/advisories/43331 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/43718 | ||
secalert@redhat.com | http://security.gentoo.org/glsa/glsa-201406-36.xml | ||
secalert@redhat.com | http://securitytracker.com/id?1025190 | ||
secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2011:056 | ||
secalert@redhat.com | http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-ndb/bind.cpp.diff?r1=1.5&r2=1.8 | Patch | |
secalert@redhat.com | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6661 | ||
secalert@redhat.com | http://www.openldap.org/lists/openldap-announce/201102/msg00000.html | ||
secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2011-0347.html | ||
secalert@redhat.com | http://www.ubuntu.com/usn/USN-1100-1 | ||
secalert@redhat.com | http://www.vupen.com/english/advisories/2011/0665 | Vendor Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=680472 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2011/02/24/12 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2011/02/25/13 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43331 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43718 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201406-36.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1025190 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2011:056 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-ndb/bind.cpp.diff?r1=1.5&r2=1.8 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6661 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/lists/openldap-announce/201102/msg00000.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-0347.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-1100-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0665 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=680472 | Patch |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openldap | openldap | 2.4.6 | |
openldap | openldap | 2.4.7 | |
openldap | openldap | 2.4.8 | |
openldap | openldap | 2.4.9 | |
openldap | openldap | 2.4.10 | |
openldap | openldap | 2.4.11 | |
openldap | openldap | 2.4.12 | |
openldap | openldap | 2.4.13 | |
openldap | openldap | 2.4.14 | |
openldap | openldap | 2.4.15 | |
openldap | openldap | 2.4.16 | |
openldap | openldap | 2.4.17 | |
openldap | openldap | 2.4.18 | |
openldap | openldap | 2.4.19 | |
openldap | openldap | 2.4.20 | |
openldap | openldap | 2.4.21 | |
openldap | openldap | 2.4.22 | |
openldap | openldap | 2.4.23 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:2.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "5EC66226-A597-4A4C-932F-F4A7BAE119C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "4AEABC84-7B67-4FD4-A891-E52C80DC881E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "340F673A-295E-4B75-A9D1-E785B0440BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "49203E99-71E2-49D4-91A0-65AAAA7DC18F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "473AEC48-FBBF-4BEB-8728-1FA80DD94807", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "7B0415EA-5F21-44C3-93F3-DDADBAA64449", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "16AFC655-E81F-4FDE-8030-9781A8B79E73", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "E99FB859-D023-4B2B-A709-05E83A46E2A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "8D2EEBC7-1FAF-43E2-A124-C387C02D9E2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "95D242E4-D5EB-4785-A6EF-60B1E8E2B0EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "F6FEDD9C-FDF7-456A-B06C-0A4A4443991D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "9245CDE2-B90A-4D47-BA20-A7869FF0A645", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "FB993E4D-E573-4495-97DE-465DDB2AA2DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.19:*:*:*:*:*:*:*", "matchCriteriaId": "D0F106A3-63D5-4D07-9440-6628DBA78BE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.20:*:*:*:*:*:*:*", "matchCriteriaId": "36CC03BC-DF34-43CD-90B0-27D23A1DD06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.21:*:*:*:*:*:*:*", "matchCriteriaId": "16C90FEE-527E-47F5-8840-517A55163D8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.22:*:*:*:*:*:*:*", "matchCriteriaId": "0FAEA812-BB47-47A3-A975-B3B8D30DBA36", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.23:*:*:*:*:*:*:*", "matchCriteriaId": "5DE5D180-3972-40A0-ADAF-A4F3364D1381", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "bind.cpp in back-ndb in OpenLDAP 2.4.x before 2.4.24 does not require authentication for the root Distinguished Name (DN), which allows remote attackers to bypass intended access restrictions via an arbitrary password." }, { "lang": "es", "value": "bind.cpp en back-ndb en OpenLDAP v2.4.x anteriores a v2.4.24 no requiere autenticaci\u00f3n para el Distinguished Name (DN), lo que permite a atacantes remotos evitar las restricciones de acceso previsto a trav\u00e9s de una contrase\u00f1a arbitraria." } ], "id": "CVE-2011-1025", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-03-20T02:00:03.767", "references": [ { "source": "secalert@redhat.com", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2011/02/24/12" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2011/02/25/13" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43331" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43718" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "source": "secalert@redhat.com", "url": "http://securitytracker.com/id?1025190" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:056" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-ndb/bind.cpp.diff?r1=1.5\u0026r2=1.8" }, { "source": "secalert@redhat.com", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6661" }, { "source": "secalert@redhat.com", "url": "http://www.openldap.org/lists/openldap-announce/201102/msg00000.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2011-0347.html" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1100-1" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0665" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680472" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/02/24/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/02/25/13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43331" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43718" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1025190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-ndb/bind.cpp.diff?r1=1.5\u0026r2=1.8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6661" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openldap.org/lists/openldap-announce/201102/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0347.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1100-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0665" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680472" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }