Page 9 of 61 results (0.014 seconds)

CVSS: 5.0EPSS: 82%CPEs: 47EXPL: 1

liblber/io.c in OpenLDAP 2.2.4 to 2.4.10 allows remote attackers to cause a denial of service (program termination) via crafted ASN.1 BER datagrams that trigger an assertion error. El archivo liblber/io.c en OpenLDAP versiones 2.2.4 hasta 2.4.10, permite a los atacantes remotos causar una denegación de servicio (finalización del programa) por medio de datagramas ASN.1 BER diseñados que desencadenan un error de aserción. This vulnerability allows remote attackers to deny services on vulnerable installations of OpenLDAP. Authentication is not required to exploit this vulnerability. The specific flaw exists in the decoding of ASN.1 BER network datagrams. When the size of a BerElement is specified incorrectly, the application will trigger an assert(), leading to abnormal program termination. • https://www.exploit-db.com/exploits/32000 http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html http://secunia.com/advisories/30853 http://secunia.com/advisories/30917 http://secunia.com/advisories/30996 http://secunia.com/advisories/31326 http://secunia.com/advisories/31364 http://secunia.com/advisories/31436 http://secunia.com/advisories/32254 http://secunia.com/advisories/32316 http • CWE-399: Resource Management Errors •

CVSS: 4.0EPSS: 0%CPEs: 1EXPL: 1

slapd/back-bdb/modrdn.c in the BDB backend for slapd in OpenLDAP 2.3.39 allows remote authenticated users to cause a denial of service (daemon crash) via a modrdn operation with a NOOP (LDAP_X_NO_OPERATION) control, a related issue to CVE-2007-6698. slapd/back-bdb/modrdn.c en el motor interno BDB para slapd de OpenLDAP 2.3.39. Permite a usuarios autentificados remotamente provocar una denegación de servicio (caída del demonio) a través de una operación modrdn con un control NOOP (LDAP_X_NO_OPERATION), un tema relacionado con CVE-2007-6698. • http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html http://secunia.com/advisories/28914 http://secunia.com/advisories/28926 http://secunia.com/advisories/28953 http://secunia.com/advisories/29068 http://secunia.com/advisories/29225 http://secunia.com/advisories/29256 http://secunia.com/advisories/29461 http://secunia.com/advisories/29682 http://secunia.com/advisories/29957 http://sec • CWE-399: Resource Management Errors •

CVSS: 4.0EPSS: 0%CPEs: 1EXPL: 0

The BDB backend for slapd in OpenLDAP before 2.3.36 allows remote authenticated users to cause a denial of service (crash) via a potentially-successful modify operation with the NOOP control set to critical, possibly due to a double free vulnerability. El backend de BDB para slapd en OpenLDAP versiones anteriores a 2.3.36, permite a los usuarios autenticados remotos causar una denegación de servicio (bloqueo) por medio de una operación de modificación potencialmente con éxito con el control NOOP establecido en crítico, posiblemente debido a una vulnerabilidad de doble liberación. • http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html http://secunia.com/advisories/28817 http://secunia.com/advisories/28953 http://secunia.com/advisories/29068 http://secunia.com/advisories/29225 http://secunia.com/advisories/29256 http://secunia.com/advisories/29682 http://secunia.com/advisories/29957 http://support.apple.com/kb/HT3937 http://wiki.rpath.com/Advisories:rPSA-2008-0059 • CWE-399: Resource Management Errors •

CVSS: 7.1EPSS: 7%CPEs: 119EXPL: 0

OpenLDAP before 2.3.39 allows remote attackers to cause a denial of service (slapd crash) via an LDAP request with a malformed objectClasses attribute. NOTE: this has been reported as a double free, but the reports are inconsistent. OpenLDAP versiones anteriores a 2.3.39, permite a atacantes remotos causar una denegación de servicio (bloqueo de slapd) por medio de una petición LDAP con un atributo objectClasses malformado. NOTA: esto ha sido reportado como doble liberación, pero los reportes son incoherentes. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=440632 http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html http://secunia.com/advisories/27424 http://secunia.com/advisories/27587 http://secunia.com/advisories/27596 http://secunia.com/advisories/27683 http://secunia.com/advisories/27756 http://secunia.com/advisories/27868 http://secunia.com/advisories/29461 http://secunia.com/advisories/29682 http://security.gentoo.org/glsa/glsa-200803-28.xml http:/&# • CWE-399: Resource Management Errors •

CVSS: 7.1EPSS: 4%CPEs: 119EXPL: 0

slapo-pcache (overlays/pcache.c) in slapd in OpenLDAP before 2.3.39, when running as a proxy-caching server, allocates memory using a malloc variant instead of calloc, which prevents an array from being initialized properly and might allow attackers to cause a denial of service (segmentation fault) via unknown vectors that prevent the array from being null terminated. slapo-pcache (overlays/pcache.c) en slapd en OpenLDAP versiones anteriores a 2.3.39, cuando es ejecutado como un servidor de almacenamiento en caché de proxy, asigna memoria mediante una variante malloc en lugar de calloc, lo que impide que una matriz se inicialice apropiadamente y podría permitir a atacantes causar una denegación de servicio (fallo de segmentación) por medio de vectores de ataque desconocidos que impiden que la matriz sea terminada en null. • http://secunia.com/advisories/27424 http://secunia.com/advisories/27683 http://secunia.com/advisories/27756 http://secunia.com/advisories/27868 http://secunia.com/advisories/29225 http://secunia.com/advisories/29461 http://secunia.com/advisories/29682 http://security.gentoo.org/glsa/glsa-200803-28.xml http://www.debian.org/security/2008/dsa-1541 http://www.mandriva.com/security/advisories?name=MDVSA-2008:058 http://www.novell.com/linux/security/advisories/2007_24_sr.html&# • CWE-399: Resource Management Errors •