Page 6 of 61 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 18EXPL: 0

The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors. La función nss_parse_ciphers en libraries/libldap/tls_m.c en OpenLDAP no analiza adecuadamente cadenas de cifrado en modo multiclave de estilo OpenSSL, lo que podría provocar el uso de un cifrado más débil que el previsto y permitir a atacantes remotos tener un impacto no especificado a través de vectores desconocidos. A flaw was found in the way OpenLDAP parsed OpenSSL-style cipher strings. As a result, OpenLDAP could potentially use ciphers that were not intended to be enabled. • http://rhn.redhat.com/errata/RHSA-2015-2131.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html http://www.securitytracker.com/id/1034221 https://bugzilla.redhat.com/show_bug.cgi?id=1238322 https://access.redhat.com/security/cve/CVE-2015-3276 • CWE-682: Incorrect Calculation •

CVSS: 5.0EPSS: 94%CPEs: 2EXPL: 2

The ber_get_next function in libraries/liblber/io.c in OpenLDAP 2.4.42 and earlier allows remote attackers to cause a denial of service (reachable assertion and application crash) via crafted BER data, as demonstrated by an attack against slapd. Vulnerabilidad en la función ber_get_next en libraries/liblber/io.c en OpenLDAP 2.4.42 y versiones anteriores, permite a atacantes remotos causar una denegación de servicio (aserción accesible y caída de la aplicación) a través de datos BER manipulados, según lo demostrado por un ataque contra slapd. A flaw was found in the way the OpenLDAP server daemon (slapd) parsed certain Basic Encoding Rules (BER) data. A remote attacker could use this flaw to crash slapd via a specially crafted packet. • https://www.exploit-db.com/exploits/38145 http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html http://rhn&# • CWE-20: Improper Input Validation •

CVSS: 4.0EPSS: 0%CPEs: 18EXPL: 0

The default slapd configuration in the Debian openldap package 2.4.23-3 through 2.4.39-1.1 allows remote authenticated users to modify the user's permissions and other user attributes via unspecified vectors. La configuración por defecto slapd en el paquete Debian openldap 2.4.23-3 hasta 2.4.39-1.1 permite a usuarios remotos autenticados modificar los permisos de usuarios y otros atributos de usuarios a través de vectores no especificados. • http://www.debian.org/security/2015/dsa-3209 http://www.openwall.com/lists/oss-security/2015/03/29/2 http://www.securityfocus.com/bid/73217 http://www.ubuntu.com/usn/USN-2742-1 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761406 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 96%CPEs: 28EXPL: 1

The deref_parseCtrl function in servers/slapd/overlays/deref.c in OpenLDAP 2.4.13 through 2.4.40 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an empty attribute list in a deref control in a search request. La función deref_parseCtrl en servers/slapd/overlays/deref.c en OpenLDAP 2.4.13 hasta 2.4.40 permite a atacantes remotos causar una denegación de servicio (referencia a puntero nulo y caída) a través de una lista de atributos vacía en un control de referencia en una solicitud de búsqueda. • http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html http://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html http://seclists.org/fulldisclosure/2019/Dec/26 http://secunia.com/advisories/62787 http://www.debian.org/security/2015/dsa-3209 http://www.mandriva.com/security/advisories?name=MDVSA-2015:073 http://www.mandriva.com/security/advisories?name=MDVSA-2015:074 http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commit%3Bh=c32e74763f77675b9e144126e375977ed6dc •

CVSS: 5.0EPSS: 2%CPEs: 4EXPL: 0

Double free vulnerability in the get_vrFilter function in servers/slapd/filter.c in OpenLDAP 2.4.40 allows remote attackers to cause a denial of service (crash) via a crafted search query with a matched values control. Vulnerabilidad de liberación doble en la función get_vrFilter en servers/slapd/filter.c en OpenLDAP 2.4.40 permite a atacantes remotos causar una denegación de servicio (caída) a través de una consulta de búsqueda manipulada con control de valores coincidentes. • http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html http://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html http://secunia.com/advisories/62787 http://www.mandriva.com/security/advisories?name=MDVSA-2015:073 http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commit%3Bh=2f1a2dd329b91afe561cd06b872d09630d4edb6a http://www.openldap.org/its/?findid=8046 http://www.openwall.com/lists/oss-security/2015/02/07/3 https://bugs.debian.org/cgi-bin/bugreport.cgi •