Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m6m8-g76c-567c

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The dns_to_ldap_dn_escape function in src/ldap_convert.c in bind-dyndb-ldap 1.1.0rc1 and earlier does not properly escape distinguished names (DN) for LDAP queries, which allows remote DNS servers to cause a denial of service (named service hang) via a "$" character in a DN in a DNS query.

The dns_to_ldap_dn_escape function in src/ldap_convert.c in bind-dyndb-ldap 1.1.0rc1 and earlier does not properly escape distinguished names (DN) for LDAP queries, which allows remote DNS servers to cause a denial of service (named service hang) via a "$" character in a DN in a DNS query.

EPSS

Процентиль: 79%
0.0127
Низкий

Дефекты

CWE-20

Связанные уязвимости

redhat
около 13 лет назад

The dns_to_ldap_dn_escape function in src/ldap_convert.c in bind-dyndb-ldap 1.1.0rc1 and earlier does not properly escape distinguished names (DN) for LDAP queries, which allows remote DNS servers to cause a denial of service (named service hang) via a "$" character in a DN in a DNS query.

nvd
около 13 лет назад

The dns_to_ldap_dn_escape function in src/ldap_convert.c in bind-dyndb-ldap 1.1.0rc1 and earlier does not properly escape distinguished names (DN) for LDAP queries, which allows remote DNS servers to cause a denial of service (named service hang) via a "$" character in a DN in a DNS query.

debian
около 13 лет назад

The dns_to_ldap_dn_escape function in src/ldap_convert.c in bind-dyndb ...

oracle-oval
около 13 лет назад

ELSA-2012-1139: bind-dyndb-ldap security update (IMPORTANT)

EPSS

Процентиль: 79%
0.0127
Низкий

Дефекты

CWE-20