CVE-2007-6698 – openldap: slapd crash on NOOP control operation on entry in bdb storage
https://notcve.org/view.php?id=CVE-2007-6698
The BDB backend for slapd in OpenLDAP before 2.3.36 allows remote authenticated users to cause a denial of service (crash) via a potentially-successful modify operation with the NOOP control set to critical, possibly due to a double free vulnerability. El backend de BDB para slapd en OpenLDAP versiones anteriores a 2.3.36, permite a los usuarios autenticados remotos causar una denegación de servicio (bloqueo) por medio de una operación de modificación potencialmente con éxito con el control NOOP establecido en crítico, posiblemente debido a una vulnerabilidad de doble liberación. • http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html http://secunia.com/advisories/28817 http://secunia.com/advisories/28953 http://secunia.com/advisories/29068 http://secunia.com/advisories/29225 http://secunia.com/advisories/29256 http://secunia.com/advisories/29682 http://secunia.com/advisories/29957 http://support.apple.com/kb/HT3937 http://wiki.rpath.com/Advisories:rPSA-2008-0059 • CWE-399: Resource Management Errors •
CVE-2006-6493 – OpenLDAP 2.4.3 - 'KBIND' Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2006-6493
Buffer overflow in the krbv4_ldap_auth function in servers/slapd/kerberos.c in OpenLDAP 2.4.3 and earlier, when OpenLDAP is compiled with the --enable-kbind (Kerberos KBIND) option, allows remote attackers to execute arbitrary code via an LDAP bind request using the LDAP_AUTH_KRBV41 authentication method and long credential data. Desbordamiento de búfer en la función krbv4_ldap_auth de servers/slapd/kerberos.c en OpenLDAP 2.4.3 y versiones anteriores, cuando el OpenLDAP es compilado con la opción kbind (Kerberos KBIND) habilitada, permite a atacantes remotos ejecutar código de su elección a través de una petición LDAP utilizando el método de autenticación LDAP_AUTH_KRBV41 y un dato largo en las credenciales. • https://www.exploit-db.com/exploits/2933 http://secunia.com/advisories/23334 http://securityreason.com/securityalert/2023 http://www.phreedom.org/solar/exploits/openldap-kbind http://www.securityfocus.com/archive/1/454181/30/0/threaded http://www.vupen.com/english/advisories/2006/4964 •