Page 7 of 57 results (0.011 seconds)

CVSS: 5.0EPSS: 2%CPEs: 24EXPL: 0

slapd in OpenLDAP before 2.4.30 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an LDAP search query with attrsOnly set to true, which causes empty attributes to be returned. slapd de OpenLDAP anteriores a 2.4.30 permite a atacantes remotos provocar una denegación de servicio (fallo de aserción y finalización del demonio) a través de una petición de búsqueda LDAP con attrsOnly asignado a "true", lo que provoca que atributos vacíos sean devueltos. • http://rhn.redhat.com/errata/RHSA-2012-0899.html http://seclists.org/fulldisclosure/2019/Dec/26 http://secunia.com/advisories/48372 http://secunia.com/advisories/49607 http://security.gentoo.org/glsa/glsa-201406-36.xml http://www.mandriva.com/security/advisories?name=MDVSA-2012:130 http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7143 http://www.openldap.org/software/release/changes.html http://www.securityfocus.com/bid/52404 https://seclists.org/bugtraq/2019/Dec • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 0%CPEs: 26EXPL: 0

libraries/libldap/tls_m.c in OpenLDAP, possibly 2.4.31 and earlier, when using the Mozilla NSS backend, always uses the default cipher suite even when TLSCipherSuite is set, which might cause OpenLDAP to use weaker ciphers than intended and make it easier for remote attackers to obtain sensitive information. libraries/libldap/tls_m.c en OpenLDAP, posiblemente v2.4.31 y anteriores, cuando se utiliza el "backend" de Mozilla NSS, siempre utiliza la suite de cifrado por defecto incluso cuando TLSCipherSuite está establecido, lo que podría provocar que OpenLDAP use algoritmos de cifrado más débiles que los esperados y que sea más fácil para que los atacantes remotos obtener información sensible. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=676309 http://rhn.redhat.com/errata/RHSA-2012-1151.html http://seclists.org/fulldisclosure/2019/Dec/26 http://security.gentoo.org/glsa/glsa-201406-36.xml http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commitdiff%3Bh=2c2bb2e http://www.openldap.org/its/index.cgi?findid=7285 http://www.openwall.com/lists/oss-security/2012/06/05/4 http://www.openwall.com/lists/oss-security/2012/06/06/1 http://www&# • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.0EPSS: 4%CPEs: 175EXPL: 0

Off-by-one error in the UTF8StringNormalize function in OpenLDAP 2.4.26 and earlier allows remote attackers to cause a denial of service (slapd crash) via a zero-length string that triggers a heap-based buffer overflow, as demonstrated using an empty postalAddressAttribute value in an LDIF entry. Error por un paso en la función UTF8StringNormalize en OpenLDAP 2.4.26 y versiones anteriores permite a atacantes remotos provocar una denegación de servicio (caída de slapd) a través de una cadena de longitud cero que desencadena un desbordamiento de búfer basado en memoria dinámica, como se demuestra utilizando un valor vacío en el valor postalAddressAttribute en una entrada LDIF. • http://secunia.com/advisories/46599 http://security.gentoo.org/glsa/glsa-201406-36.xml http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commitdiff%3Bh=507238713b71208ec4f262f312cb495a302df9e9 http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7059%3Bselectid=7059 http://www.openwall.com/lists/oss-security/2011/10/26/5 http://www.openwall.com/lists/oss-security/2011/10/26/9 http://www.securityfocus.com/bid/50384 http://www.ubuntu.com/usn/USN-1266-1 https:/&# • CWE-189: Numeric Errors •

CVSS: 5.1EPSS: 0%CPEs: 18EXPL: 0

chain.c in back-ldap in OpenLDAP 2.4.x before 2.4.24, when a master-slave configuration with a chain overlay and ppolicy_forward_updates (aka authentication-failure forwarding) is used, allows remote authenticated users to bypass external-program authentication by sending an invalid password to a slave server. chain.c en back-ldap en OpenLDAP v2.4.x anteriores a v2.4.24 cuando se utiliza una configuración maestro-esclavo con una superposición de la cadena y policy_forward_updates (también conocido como authentication-failure forwarding), permite a usuarios remotos autenticados eludir la autenticación por programa externo mediante el envío de una contraseña no válida para un servidor esclavo. • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735 http://openwall.com/lists/oss-security/2011/02/24/12 http://openwall.com/lists/oss-security/2011/02/25/13 http://secunia.com/advisories/43331 http://secunia.com/advisories/43708 http://secunia.com/advisories/43718 http://security.gentoo.org/glsa/glsa-201406-36.xml http://securitytracker.com/id?1025188 http://www.mandriva.com/security/advisories • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.8EPSS: 1%CPEs: 18EXPL: 0

bind.cpp in back-ndb in OpenLDAP 2.4.x before 2.4.24 does not require authentication for the root Distinguished Name (DN), which allows remote attackers to bypass intended access restrictions via an arbitrary password. bind.cpp en back-ndb en OpenLDAP v2.4.x anteriores a v2.4.24 no requiere autenticación para el Distinguished Name (DN), lo que permite a atacantes remotos evitar las restricciones de acceso previsto a través de una contraseña arbitraria. • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 http://openwall.com/lists/oss-security/2011/02/24/12 http://openwall.com/lists/oss-security/2011/02/25/13 http://secunia.com/advisories/43331 http://secunia.com/advisories/43718 http://security.gentoo.org/glsa/glsa-201406-36.xml http://securitytracker.com/id?1025190 http://www.mandriva.com/security/advisories?name=MDVSA-2011:056 http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-ndb/bind.cpp.diff& • CWE-287: Improper Authentication •