Page 6 of 59 results (0.010 seconds)

CVSS: 5.0EPSS: 94%CPEs: 2EXPL: 2

The ber_get_next function in libraries/liblber/io.c in OpenLDAP 2.4.42 and earlier allows remote attackers to cause a denial of service (reachable assertion and application crash) via crafted BER data, as demonstrated by an attack against slapd. Vulnerabilidad en la función ber_get_next en libraries/liblber/io.c en OpenLDAP 2.4.42 y versiones anteriores, permite a atacantes remotos causar una denegación de servicio (aserción accesible y caída de la aplicación) a través de datos BER manipulados, según lo demostrado por un ataque contra slapd. A flaw was found in the way the OpenLDAP server daemon (slapd) parsed certain Basic Encoding Rules (BER) data. A remote attacker could use this flaw to crash slapd via a specially crafted packet. • https://www.exploit-db.com/exploits/38145 http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html http://rhn&# • CWE-20: Improper Input Validation •

CVSS: 4.0EPSS: 0%CPEs: 18EXPL: 0

The default slapd configuration in the Debian openldap package 2.4.23-3 through 2.4.39-1.1 allows remote authenticated users to modify the user's permissions and other user attributes via unspecified vectors. La configuración por defecto slapd en el paquete Debian openldap 2.4.23-3 hasta 2.4.39-1.1 permite a usuarios remotos autenticados modificar los permisos de usuarios y otros atributos de usuarios a través de vectores no especificados. • http://www.debian.org/security/2015/dsa-3209 http://www.openwall.com/lists/oss-security/2015/03/29/2 http://www.securityfocus.com/bid/73217 http://www.ubuntu.com/usn/USN-2742-1 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761406 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 95%CPEs: 28EXPL: 1

The deref_parseCtrl function in servers/slapd/overlays/deref.c in OpenLDAP 2.4.13 through 2.4.40 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an empty attribute list in a deref control in a search request. La función deref_parseCtrl en servers/slapd/overlays/deref.c en OpenLDAP 2.4.13 hasta 2.4.40 permite a atacantes remotos causar una denegación de servicio (referencia a puntero nulo y caída) a través de una lista de atributos vacía en un control de referencia en una solicitud de búsqueda. • http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html http://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html http://seclists.org/fulldisclosure/2019/Dec/26 http://secunia.com/advisories/62787 http://www.debian.org/security/2015/dsa-3209 http://www.mandriva.com/security/advisories?name=MDVSA-2015:073 http://www.mandriva.com/security/advisories?name=MDVSA-2015:074 http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commit%3Bh=c32e74763f77675b9e144126e375977ed6dc •

CVSS: 5.0EPSS: 2%CPEs: 4EXPL: 0

Double free vulnerability in the get_vrFilter function in servers/slapd/filter.c in OpenLDAP 2.4.40 allows remote attackers to cause a denial of service (crash) via a crafted search query with a matched values control. Vulnerabilidad de liberación doble en la función get_vrFilter en servers/slapd/filter.c en OpenLDAP 2.4.40 permite a atacantes remotos causar una denegación de servicio (caída) a través de una consulta de búsqueda manipulada con control de valores coincidentes. • http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html http://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html http://secunia.com/advisories/62787 http://www.mandriva.com/security/advisories?name=MDVSA-2015:073 http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commit%3Bh=2f1a2dd329b91afe561cd06b872d09630d4edb6a http://www.openldap.org/its/?findid=8046 http://www.openwall.com/lists/oss-security/2015/02/07/3 https://bugs.debian.org/cgi-bin/bugreport.cgi •

CVSS: 4.3EPSS: 94%CPEs: 33EXPL: 0

The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search. El overlay rwm en OpenLDAP 2.4.23, 2.4.36 y anteriores no cuenta debidamente las referencias, lo que permite a atacantes remotos causar una denegación de servicio (caída de slapd) mediante la desvinculación inmediata después de una solicitud de búsqueda, lo que provoca que rwm_conn_destroy libere la sesión mientras que está siendo utilizado por rwm_op_search. • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735 http://rhn.redhat.com/errata/RHSA-2014-0126.html http://rhn.redhat.com/errata/RHSA-2014-0206.html http://seclists.org/fulldisclosure/2019/Dec/26 http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-4449 http://www.debian.org/security/2015/dsa-3209 http://www.mandriva.com/security/advisories?name=MDVSA-2014:026 http://www.openldap&# • CWE-189: Numeric Errors •