Page 7 of 51 results (0.011 seconds)

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 0

libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. libraries/libldap/tls_o.c en OpenLDAP, cuando se usa OpenSSL, no maneja de forma adecuada el caracter '\0' en un nombre de dominio, dentro del campo sujeto del Common Name (CN) en los certificados X.509, lo que permite a atacantes man-in-the-middle, espíar servidores SSL de su elección a través de certificados manipulados concedidos por Autoridades Certificadoras, esta relacionado con CVE-2009-2408. • http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036138.html http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html http://marc.info/?l=oss-security&m=125198917018936&w=2 http://marc.info/?l=oss-security&m=125369675820512&w=2 http://secunia.com/advisories/38769 http://secunia.com/advisories/40677 http://security.gentoo.org/glsa/glsa-201406-36.xml http://support.apple. • CWE-295: Improper Certificate Validation •

CVSS: 5.0EPSS: 82%CPEs: 47EXPL: 1

liblber/io.c in OpenLDAP 2.2.4 to 2.4.10 allows remote attackers to cause a denial of service (program termination) via crafted ASN.1 BER datagrams that trigger an assertion error. El archivo liblber/io.c en OpenLDAP versiones 2.2.4 hasta 2.4.10, permite a los atacantes remotos causar una denegación de servicio (finalización del programa) por medio de datagramas ASN.1 BER diseñados que desencadenan un error de aserción. This vulnerability allows remote attackers to deny services on vulnerable installations of OpenLDAP. Authentication is not required to exploit this vulnerability. The specific flaw exists in the decoding of ASN.1 BER network datagrams. When the size of a BerElement is specified incorrectly, the application will trigger an assert(), leading to abnormal program termination. • https://www.exploit-db.com/exploits/32000 http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html http://secunia.com/advisories/30853 http://secunia.com/advisories/30917 http://secunia.com/advisories/30996 http://secunia.com/advisories/31326 http://secunia.com/advisories/31364 http://secunia.com/advisories/31436 http://secunia.com/advisories/32254 http://secunia.com/advisories/32316 http • CWE-399: Resource Management Errors •

CVSS: 4.0EPSS: 0%CPEs: 1EXPL: 1

slapd/back-bdb/modrdn.c in the BDB backend for slapd in OpenLDAP 2.3.39 allows remote authenticated users to cause a denial of service (daemon crash) via a modrdn operation with a NOOP (LDAP_X_NO_OPERATION) control, a related issue to CVE-2007-6698. slapd/back-bdb/modrdn.c en el motor interno BDB para slapd de OpenLDAP 2.3.39. Permite a usuarios autentificados remotamente provocar una denegación de servicio (caída del demonio) a través de una operación modrdn con un control NOOP (LDAP_X_NO_OPERATION), un tema relacionado con CVE-2007-6698. • http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html http://secunia.com/advisories/28914 http://secunia.com/advisories/28926 http://secunia.com/advisories/28953 http://secunia.com/advisories/29068 http://secunia.com/advisories/29225 http://secunia.com/advisories/29256 http://secunia.com/advisories/29461 http://secunia.com/advisories/29682 http://secunia.com/advisories/29957 http://sec • CWE-399: Resource Management Errors •

CVSS: 4.0EPSS: 0%CPEs: 1EXPL: 0

The BDB backend for slapd in OpenLDAP before 2.3.36 allows remote authenticated users to cause a denial of service (crash) via a potentially-successful modify operation with the NOOP control set to critical, possibly due to a double free vulnerability. El backend de BDB para slapd en OpenLDAP versiones anteriores a 2.3.36, permite a los usuarios autenticados remotos causar una denegación de servicio (bloqueo) por medio de una operación de modificación potencialmente con éxito con el control NOOP establecido en crítico, posiblemente debido a una vulnerabilidad de doble liberación. • http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html http://secunia.com/advisories/28817 http://secunia.com/advisories/28953 http://secunia.com/advisories/29068 http://secunia.com/advisories/29225 http://secunia.com/advisories/29256 http://secunia.com/advisories/29682 http://secunia.com/advisories/29957 http://support.apple.com/kb/HT3937 http://wiki.rpath.com/Advisories:rPSA-2008-0059 • CWE-399: Resource Management Errors •

CVSS: 7.1EPSS: 7%CPEs: 119EXPL: 0

OpenLDAP before 2.3.39 allows remote attackers to cause a denial of service (slapd crash) via an LDAP request with a malformed objectClasses attribute. NOTE: this has been reported as a double free, but the reports are inconsistent. OpenLDAP versiones anteriores a 2.3.39, permite a atacantes remotos causar una denegación de servicio (bloqueo de slapd) por medio de una petición LDAP con un atributo objectClasses malformado. NOTA: esto ha sido reportado como doble liberación, pero los reportes son incoherentes. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=440632 http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html http://secunia.com/advisories/27424 http://secunia.com/advisories/27587 http://secunia.com/advisories/27596 http://secunia.com/advisories/27683 http://secunia.com/advisories/27756 http://secunia.com/advisories/27868 http://secunia.com/advisories/29461 http://secunia.com/advisories/29682 http://security.gentoo.org/glsa/glsa-200803-28.xml http:/&# • CWE-399: Resource Management Errors •