Vulnerability CVE-2013-4449


Published: 2014-02-05

Description:
The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
OpenLDAP 2.4.36 Remote Users Deny Of Service
Vincent Danen
05.02.2014

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Openldap -> Openldap 
Debian -> Debian linux 

 References:
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735
http://rhn.redhat.com/errata/RHSA-2014-0126.html
http://rhn.redhat.com/errata/RHSA-2014-0206.html
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-4449
http://www.debian.org/security/2015/dsa-3209
http://www.mandriva.com/security/advisories?name=MDVSA-2014:026
http://www.openldap.org/its/index.cgi/Incoming?id=7723
http://www.openwall.com/lists/oss-security/2013/10/19/3
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/63190
http://www.securitytracker.com/id/1029711
https://bugzilla.redhat.com/show_bug.cgi?id=1019490

Copyright 2024, cxsecurity.com

 

Back to Top