Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-3429

Опубликовано: 01 авг. 2012
Источник: redhat
CVSS2: 4.3
EPSS Низкий

Описание

The dns_to_ldap_dn_escape function in src/ldap_convert.c in bind-dyndb-ldap 1.1.0rc1 and earlier does not properly escape distinguished names (DN) for LDAP queries, which allows remote DNS servers to cause a denial of service (named service hang) via a "$" character in a DN in a DNS query.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=842466bind-dyndb-ldap: named DoS via DNS query with $ in name

EPSS

Процентиль: 79%
0.0127
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

nvd
около 13 лет назад

The dns_to_ldap_dn_escape function in src/ldap_convert.c in bind-dyndb-ldap 1.1.0rc1 and earlier does not properly escape distinguished names (DN) for LDAP queries, which allows remote DNS servers to cause a denial of service (named service hang) via a "$" character in a DN in a DNS query.

debian
около 13 лет назад

The dns_to_ldap_dn_escape function in src/ldap_convert.c in bind-dyndb ...

github
больше 3 лет назад

The dns_to_ldap_dn_escape function in src/ldap_convert.c in bind-dyndb-ldap 1.1.0rc1 and earlier does not properly escape distinguished names (DN) for LDAP queries, which allows remote DNS servers to cause a denial of service (named service hang) via a "$" character in a DN in a DNS query.

oracle-oval
около 13 лет назад

ELSA-2012-1139: bind-dyndb-ldap security update (IMPORTANT)

EPSS

Процентиль: 79%
0.0127
Низкий

4.3 Medium

CVSS2