Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2013-4449

Опубликовано: 05 фев. 2014
Источник: nvd
CVSS2: 4.3
EPSS Высокий

Описание

The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*
Версия до 2.4.36 (включая)
cpe:2.3:a:openldap:openldap:2.4.6:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.7:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.8:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.9:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.10:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.11:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.12:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.13:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.14:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.15:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.16:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.17:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.18:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.19:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.20:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.21:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.22:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.23:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.24:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.25:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.26:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.27:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.28:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.29:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.30:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.31:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.32:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.33:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.34:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.35:*:*:*:*:*:*:*

EPSS

Процентиль: 99%
0.71815
Высокий

4.3 Medium

CVSS2

Дефекты

CWE-189

Связанные уязвимости

ubuntu
больше 11 лет назад

The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.

redhat
почти 12 лет назад

The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.

debian
больше 11 лет назад

The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not prope ...

github
больше 3 лет назад

The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.

oracle-oval
больше 11 лет назад

ELSA-2014-0206: openldap security update (MODERATE)

EPSS

Процентиль: 99%
0.71815
Высокий

4.3 Medium

CVSS2

Дефекты

CWE-189