5

CVE-2012-3429

Exploit
The dns_to_ldap_dn_escape function in src/ldap_convert.c in bind-dyndb-ldap 1.1.0rc1 and earlier does not properly escape distinguished names (DN) for LDAP queries, which allows remote DNS servers to cause a denial of service (named service hang) via a "$" character in a DN in a DNS query.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Martin NagyBind-dyndb-ldap Updaterc1 Version <= 1.1.0
Martin NagyBind-dyndb-ldap Version0.1.0 Updatea1
Martin NagyBind-dyndb-ldap Version0.1.0 Updateb
Martin NagyBind-dyndb-ldap Version0.2.0
Martin NagyBind-dyndb-ldap Version1.0.0 Updateb1
Martin NagyBind-dyndb-ldap Version1.0.0 Updaterc1
Martin NagyBind-dyndb-ldap Version1.1.0 Updatea1
Martin NagyBind-dyndb-ldap Version1.1.0 Updatea2
Martin NagyBind-dyndb-ldap Version1.1.0 Updateb1
Martin NagyBind-dyndb-ldap Version1.1.0 Updateb2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 1.27% 0.786
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.