Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-6908

Опубликовано: 09 сент. 2015
Источник: redhat
CVSS2: 5
EPSS Высокий

Описание

The ber_get_next function in libraries/liblber/io.c in OpenLDAP 2.4.42 and earlier allows remote attackers to cause a denial of service (reachable assertion and application crash) via crafted BER data, as demonstrated by an attack against slapd.

A flaw was found in the way the OpenLDAP server daemon (slapd) parsed certain Basic Encoding Rules (BER) data. A remote attacker could use this flaw to crash slapd via a specially crafted packet.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4openldapWill not fix
Red Hat Enterprise Linux 5openldapFixedRHSA-2015:184029.09.2015
Red Hat Enterprise Linux 6openldapFixedRHSA-2015:184029.09.2015
Red Hat Enterprise Linux 7openldapFixedRHSA-2015:184029.09.2015

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1262393openldap: ber_get_next denial of service vulnerability

EPSS

Процентиль: 99%
0.72592
Высокий

5 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 10 лет назад

The ber_get_next function in libraries/liblber/io.c in OpenLDAP 2.4.42 and earlier allows remote attackers to cause a denial of service (reachable assertion and application crash) via crafted BER data, as demonstrated by an attack against slapd.

nvd
почти 10 лет назад

The ber_get_next function in libraries/liblber/io.c in OpenLDAP 2.4.42 and earlier allows remote attackers to cause a denial of service (reachable assertion and application crash) via crafted BER data, as demonstrated by an attack against slapd.

debian
почти 10 лет назад

The ber_get_next function in libraries/liblber/io.c in OpenLDAP 2.4.42 ...

suse-cvrf
больше 9 лет назад

Security update for openldap2

github
больше 3 лет назад

The ber_get_next function in libraries/liblber/io.c in OpenLDAP 2.4.42 and earlier allows remote attackers to cause a denial of service (reachable assertion and application crash) via crafted BER data, as demonstrated by an attack against slapd.

EPSS

Процентиль: 99%
0.72592
Высокий

5 Medium

CVSS2