Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-2134

Опубликовано: 26 фев. 2014
Источник: debian
EPSS Низкий

Описание

The handle_connection_error function in ldap_helper.c in bind-dyndb-ldap before 1.1.0rc1 does not properly handle LDAP query errors, which allows remote attackers to cause a denial of service (infinite loop and named server hang) via a non-alphabet character in the base DN in an LDAP search DNS query.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
bind-dyndb-ldapnot-affectedpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=815846

  • https://www.openwall.com/lists/oss-security/2012/04/24/14

  • https://pagure.io/bind-dyndb-ldap/c/cd33194c5a61e98cba53212458cce02b849077ba (v1.1.0rc1)

EPSS

Процентиль: 76%
0.01019
Низкий

Связанные уязвимости

redhat
больше 13 лет назад

The handle_connection_error function in ldap_helper.c in bind-dyndb-ldap before 1.1.0rc1 does not properly handle LDAP query errors, which allows remote attackers to cause a denial of service (infinite loop and named server hang) via a non-alphabet character in the base DN in an LDAP search DNS query.

nvd
больше 11 лет назад

The handle_connection_error function in ldap_helper.c in bind-dyndb-ldap before 1.1.0rc1 does not properly handle LDAP query errors, which allows remote attackers to cause a denial of service (infinite loop and named server hang) via a non-alphabet character in the base DN in an LDAP search DNS query.

github
больше 3 лет назад

The handle_connection_error function in ldap_helper.c in bind-dyndb-ldap before 1.1.0rc1 does not properly handle LDAP query errors, which allows remote attackers to cause a denial of service (infinite loop and named server hang) via a non-alphabet character in the base DN in an LDAP search DNS query.

oracle-oval
около 13 лет назад

ELSA-2012-0683: bind-dyndb-ldap security update (IMPORTANT)

EPSS

Процентиль: 76%
0.01019
Низкий