
CVE-2019-13057 – Ubuntu Security Notice USN-4078-2
https://notcve.org/view.php?id=CVE-2019-13057
26 Jul 2019 — An issue was discovered in the server in OpenLDAP before 2.4.48. When the server administrator delegates rootDN (database admin) privileges for certain databases but wants to maintain isolation (e.g., for multi-tenant deployments), slapd does not properly stop a rootDN from requesting authorization as an identity from another database during a SASL bind or with a proxyAuthz (RFC 4370) control. (It is not a common configuration to deploy a system where the server administrator and a DB administrator enjoy di... • http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html •

CVE-2017-17740
https://notcve.org/view.php?id=CVE-2017-17740
18 Dec 2017 — contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation. contrib/slapd-modules/nops/nops.c en OpenLDAP hasta la versión 2.4.45, cuando el módulo nops y la capa memberof están activados, intenta liberar un búfer que se había asignado en la pila, lo que permite que los atacantes rem... • http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2017-14159
https://notcve.org/view.php?id=CVE-2017-14159
05 Sep 2017 — slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command, as demonstrated by openldap-initscript. slapd en OpenLDAP en su versión 2.4.45 y anteriores crea un archivo PID tras eliminar privilegios a una cuenta no-root, lo que podría permitir que usuarios locales terminen ... • http://www.openldap.org/its/index.cgi?findid=8703 • CWE-665: Improper Initialization •

CVE-2017-9287 – openldap: Double free vulnerability in servers/slapd/back-mdb/search.c
https://notcve.org/view.php?id=CVE-2017-9287
29 May 2017 — servers/slapd/back-mdb/search.c in OpenLDAP through 2.4.44 is prone to a double free vulnerability. A user with access to search the directory can crash slapd by issuing a search including the Paged Results control with a page size of 0. servers/slapd/back-mdb/search.c en OpenLDAP hasta la versión 2.4.44 es propenso a una doble vulnerabilidad de liberación de memoria. Un usuario con acceso para buscar en el directorio puede hacer que slapd deje de funcionar al emitir una búsqueda que incluya el control Page... • http://www.debian.org/security/2017/dsa-3868 • CWE-415: Double Free CWE-416: Use After Free •

CVE-2015-3276 – openldap: incorrect multi-keyword mode cipherstring parsing
https://notcve.org/view.php?id=CVE-2015-3276
20 Nov 2015 — The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors. La función nss_parse_ciphers en libraries/libldap/tls_m.c en OpenLDAP no analiza adecuadamente cadenas de cifrado en modo multiclave de estilo OpenSSL, lo que podría provocar el uso de un cifrado más débil que el previsto y permitir ... • http://rhn.redhat.com/errata/RHSA-2015-2131.html • CWE-682: Incorrect Calculation •

CVE-2015-6908 – OpenLDAP 2.4.42 - ber_get_next Denial of Service
https://notcve.org/view.php?id=CVE-2015-6908
11 Sep 2015 — The ber_get_next function in libraries/liblber/io.c in OpenLDAP 2.4.42 and earlier allows remote attackers to cause a denial of service (reachable assertion and application crash) via crafted BER data, as demonstrated by an attack against slapd. Vulnerabilidad en la función ber_get_next en libraries/liblber/io.c en OpenLDAP 2.4.42 y versiones anteriores, permite a atacantes remotos causar una denegación de servicio (aserción accesible y caída de la aplicación) a través de datos BER manipulados, según lo dem... • https://www.exploit-db.com/exploits/38145 • CWE-20: Improper Input Validation •

CVE-2014-9713 – Debian Security Advisory 3209-1
https://notcve.org/view.php?id=CVE-2014-9713
31 Mar 2015 — The default slapd configuration in the Debian openldap package 2.4.23-3 through 2.4.39-1.1 allows remote authenticated users to modify the user's permissions and other user attributes via unspecified vectors. La configuración por defecto slapd en el paquete Debian openldap 2.4.23-3 hasta 2.4.39-1.1 permite a usuarios remotos autenticados modificar los permisos de usuarios y otros atributos de usuarios a través de vectores no especificados. Denis Andzakovic discovered that OpenLDAP incorrectly handled certai... • http://www.debian.org/security/2015/dsa-3209 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2015-1545 – Apple Security Advisory 2019-12-10-3
https://notcve.org/view.php?id=CVE-2015-1545
12 Feb 2015 — The deref_parseCtrl function in servers/slapd/overlays/deref.c in OpenLDAP 2.4.13 through 2.4.40 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an empty attribute list in a deref control in a search request. La función deref_parseCtrl en servers/slapd/overlays/deref.c en OpenLDAP 2.4.13 hasta 2.4.40 permite a atacantes remotos causar una denegación de servicio (referencia a puntero nulo y caída) a través de una lista de atributos vacía en un control de referenc... • http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html •

CVE-2013-4449 – openldap: segfault on certain queries with rwm overlay
https://notcve.org/view.php?id=CVE-2013-4449
03 Feb 2014 — The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search. El overlay rwm en OpenLDAP 2.4.23, 2.4.36 y anteriores no cuenta debidamente las referencias, lo que permite a atacantes remotos causar una denegación de servicio (caída de slapd) mediante la desvi... • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 • CWE-189: Numeric Errors •

CVE-2012-1164 – (slapd): Assertion failure by processing search queries requesting only attributes for particular entry
https://notcve.org/view.php?id=CVE-2012-1164
29 Jun 2012 — slapd in OpenLDAP before 2.4.30 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an LDAP search query with attrsOnly set to true, which causes empty attributes to be returned. slapd de OpenLDAP anteriores a 2.4.30 permite a atacantes remotos provocar una denegación de servicio (fallo de aserción y finalización del demonio) a través de una petición de búsqueda LDAP con attrsOnly asignado a "true", lo que provoca que atributos vacíos sean devueltos. It was discovere... • http://rhn.redhat.com/errata/RHSA-2012-0899.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •