Описание
Multiple buffer overflows in OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allow remote attackers to execute arbitrary code via (1) long -t or -r parameters to slurpd, (2) a malicious ldapfilter.conf file that is not properly handled by getfilter functions, (3) a malicious ldaptemplates.conf that causes an overflow in libldap, (4) a certain access control list that causes an overflow in slapd, or (5) a long generated filename for logging rejected replication requests.
Multiple buffer overflows in OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allow remote attackers to execute arbitrary code via (1) long -t or -r parameters to slurpd, (2) a malicious ldapfilter.conf file that is not properly handled by getfilter functions, (3) a malicious ldaptemplates.conf that causes an overflow in libldap, (4) a certain access control list that causes an overflow in slapd, or (5) a long generated filename for logging rejected replication requests.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2002-1378
- https://exchange.xforce.ibmcloud.com/vulnerabilities/10800
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000556
- http://www.ciac.org/ciac/bulletins/n-043.shtml
- http://www.debian.org/security/2003/dsa-227
- http://www.linuxsecurity.com/advisories/gentoo_advisory-2704.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2003:006
- http://www.novell.com/linux/security/advisories/2002_047_openldap2.html
- http://www.redhat.com/support/errata/RHSA-2003-040.html
- http://www.securityfocus.com/advisories/4827
- http://www.securityfocus.com/bid/6328
- http://www.turbolinux.com/security/TLSA-2003-5.txt
EPSS
CVE ID
Связанные уязвимости
Multiple buffer overflows in OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allow remote attackers to execute arbitrary code via (1) long -t or -r parameters to slurpd, (2) a malicious ldapfilter.conf file that is not properly handled by getfilter functions, (3) a malicious ldaptemplates.conf that causes an overflow in libldap, (4) a certain access control list that causes an overflow in slapd, or (5) a long generated filename for logging rejected replication requests.
Multiple buffer overflows in OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allow remote attackers to execute arbitrary code via (1) long -t or -r parameters to slurpd, (2) a malicious ldapfilter.conf file that is not properly handled by getfilter functions, (3) a malicious ldaptemplates.conf that causes an overflow in libldap, (4) a certain access control list that causes an overflow in slapd, or (5) a long generated filename for logging rejected replication requests.
Multiple buffer overflows in OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier ...
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS