Page 6 of 33 results (0.016 seconds)

CVSS: 5.0EPSS: 94%CPEs: 2EXPL: 2

The ber_get_next function in libraries/liblber/io.c in OpenLDAP 2.4.42 and earlier allows remote attackers to cause a denial of service (reachable assertion and application crash) via crafted BER data, as demonstrated by an attack against slapd. Vulnerabilidad en la función ber_get_next en libraries/liblber/io.c en OpenLDAP 2.4.42 y versiones anteriores, permite a atacantes remotos causar una denegación de servicio (aserción accesible y caída de la aplicación) a través de datos BER manipulados, según lo demostrado por un ataque contra slapd. A flaw was found in the way the OpenLDAP server daemon (slapd) parsed certain Basic Encoding Rules (BER) data. A remote attacker could use this flaw to crash slapd via a specially crafted packet. • https://www.exploit-db.com/exploits/38145 http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html http://rhn&# • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 94%CPEs: 33EXPL: 0

The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search. El overlay rwm en OpenLDAP 2.4.23, 2.4.36 y anteriores no cuenta debidamente las referencias, lo que permite a atacantes remotos causar una denegación de servicio (caída de slapd) mediante la desvinculación inmediata después de una solicitud de búsqueda, lo que provoca que rwm_conn_destroy libere la sesión mientras que está siendo utilizado por rwm_op_search. • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735 http://rhn.redhat.com/errata/RHSA-2014-0126.html http://rhn.redhat.com/errata/RHSA-2014-0206.html http://seclists.org/fulldisclosure/2019/Dec/26 http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-4449 http://www.debian.org/security/2015/dsa-3209 http://www.mandriva.com/security/advisories?name=MDVSA-2014:026 http://www.openldap&# • CWE-189: Numeric Errors •

CVSS: 5.0EPSS: 2%CPEs: 24EXPL: 0

slapd in OpenLDAP before 2.4.30 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an LDAP search query with attrsOnly set to true, which causes empty attributes to be returned. slapd de OpenLDAP anteriores a 2.4.30 permite a atacantes remotos provocar una denegación de servicio (fallo de aserción y finalización del demonio) a través de una petición de búsqueda LDAP con attrsOnly asignado a "true", lo que provoca que atributos vacíos sean devueltos. • http://rhn.redhat.com/errata/RHSA-2012-0899.html http://seclists.org/fulldisclosure/2019/Dec/26 http://secunia.com/advisories/48372 http://secunia.com/advisories/49607 http://security.gentoo.org/glsa/glsa-201406-36.xml http://www.mandriva.com/security/advisories?name=MDVSA-2012:130 http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7143 http://www.openldap.org/software/release/changes.html http://www.securityfocus.com/bid/52404 https://seclists.org/bugtraq/2019/Dec • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 0%CPEs: 26EXPL: 0

libraries/libldap/tls_m.c in OpenLDAP, possibly 2.4.31 and earlier, when using the Mozilla NSS backend, always uses the default cipher suite even when TLSCipherSuite is set, which might cause OpenLDAP to use weaker ciphers than intended and make it easier for remote attackers to obtain sensitive information. libraries/libldap/tls_m.c en OpenLDAP, posiblemente v2.4.31 y anteriores, cuando se utiliza el "backend" de Mozilla NSS, siempre utiliza la suite de cifrado por defecto incluso cuando TLSCipherSuite está establecido, lo que podría provocar que OpenLDAP use algoritmos de cifrado más débiles que los esperados y que sea más fácil para que los atacantes remotos obtener información sensible. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=676309 http://rhn.redhat.com/errata/RHSA-2012-1151.html http://seclists.org/fulldisclosure/2019/Dec/26 http://security.gentoo.org/glsa/glsa-201406-36.xml http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commitdiff%3Bh=2c2bb2e http://www.openldap.org/its/index.cgi?findid=7285 http://www.openwall.com/lists/oss-security/2012/06/05/4 http://www.openwall.com/lists/oss-security/2012/06/06/1 http://www&# • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.0EPSS: 4%CPEs: 175EXPL: 0

Off-by-one error in the UTF8StringNormalize function in OpenLDAP 2.4.26 and earlier allows remote attackers to cause a denial of service (slapd crash) via a zero-length string that triggers a heap-based buffer overflow, as demonstrated using an empty postalAddressAttribute value in an LDIF entry. Error por un paso en la función UTF8StringNormalize en OpenLDAP 2.4.26 y versiones anteriores permite a atacantes remotos provocar una denegación de servicio (caída de slapd) a través de una cadena de longitud cero que desencadena un desbordamiento de búfer basado en memoria dinámica, como se demuestra utilizando un valor vacío en el valor postalAddressAttribute en una entrada LDIF. • http://secunia.com/advisories/46599 http://security.gentoo.org/glsa/glsa-201406-36.xml http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commitdiff%3Bh=507238713b71208ec4f262f312cb495a302df9e9 http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7059%3Bselectid=7059 http://www.openwall.com/lists/oss-security/2011/10/26/5 http://www.openwall.com/lists/oss-security/2011/10/26/9 http://www.securityfocus.com/bid/50384 http://www.ubuntu.com/usn/USN-1266-1 https:/&# • CWE-189: Numeric Errors •