Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-3429

Опубликовано: 07 авг. 2012
Источник: debian
EPSS Низкий

Описание

The dns_to_ldap_dn_escape function in src/ldap_convert.c in bind-dyndb-ldap 1.1.0rc1 and earlier does not properly escape distinguished names (DN) for LDAP queries, which allows remote DNS servers to cause a denial of service (named service hang) via a "$" character in a DN in a DNS query.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
bind-dyndb-ldapnot-affectedpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=842466

  • https://pagure.io/bind-dyndb-ldap/c/f345805c73c294db42452ae966c48fbc36c48006 (v2.0)

EPSS

Процентиль: 79%
0.0127
Низкий

Связанные уязвимости

redhat
около 13 лет назад

The dns_to_ldap_dn_escape function in src/ldap_convert.c in bind-dyndb-ldap 1.1.0rc1 and earlier does not properly escape distinguished names (DN) for LDAP queries, which allows remote DNS servers to cause a denial of service (named service hang) via a "$" character in a DN in a DNS query.

nvd
около 13 лет назад

The dns_to_ldap_dn_escape function in src/ldap_convert.c in bind-dyndb-ldap 1.1.0rc1 and earlier does not properly escape distinguished names (DN) for LDAP queries, which allows remote DNS servers to cause a denial of service (named service hang) via a "$" character in a DN in a DNS query.

github
больше 3 лет назад

The dns_to_ldap_dn_escape function in src/ldap_convert.c in bind-dyndb-ldap 1.1.0rc1 and earlier does not properly escape distinguished names (DN) for LDAP queries, which allows remote DNS servers to cause a denial of service (named service hang) via a "$" character in a DN in a DNS query.

oracle-oval
около 13 лет назад

ELSA-2012-1139: bind-dyndb-ldap security update (IMPORTANT)

EPSS

Процентиль: 79%
0.0127
Низкий