Openldap

Openldap

59 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 5.75%
  • Veröffentlicht 26.07.2019 13:15:12
  • Zuletzt bearbeitet 21.11.2024 04:25:11

An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simpl...

  • EPSS 2.84%
  • Veröffentlicht 18.12.2017 06:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd...

  • EPSS 0.11%
  • Veröffentlicht 05.09.2017 18:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root s...

Exploit
  • EPSS 38.97%
  • Veröffentlicht 29.05.2017 16:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

servers/slapd/back-mdb/search.c in OpenLDAP through 2.4.44 is prone to a double free vulnerability. A user with access to search the directory can crash slapd by issuing a search including the Paged Results control with a page size of 0.

  • EPSS 1.76%
  • Veröffentlicht 07.12.2015 20:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified...

Exploit
  • EPSS 73.04%
  • Veröffentlicht 11.09.2015 16:59:12
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The ber_get_next function in libraries/liblber/io.c in OpenLDAP 2.4.42 and earlier allows remote attackers to cause a denial of service (reachable assertion and application crash) via crafted BER data, as demonstrated by an attack against slapd.

  • EPSS 0.14%
  • Veröffentlicht 01.04.2015 14:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The default slapd configuration in the Debian openldap package 2.4.23-3 through 2.4.39-1.1 allows remote authenticated users to modify the user's permissions and other user attributes via unspecified vectors.

  • EPSS 10.38%
  • Veröffentlicht 12.02.2015 16:59:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Double free vulnerability in the get_vrFilter function in servers/slapd/filter.c in OpenLDAP 2.4.40 allows remote attackers to cause a denial of service (crash) via a crafted search query with a matched values control.

Exploit
  • EPSS 72.59%
  • Veröffentlicht 12.02.2015 16:59:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The deref_parseCtrl function in servers/slapd/overlays/deref.c in OpenLDAP 2.4.13 through 2.4.40 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an empty attribute list in a deref control in a search requ...

  • EPSS 73.42%
  • Veröffentlicht 05.02.2014 18:55:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to f...