The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.
Max CVSS
9.8
EPSS Score
79.65%
Published
2010-07-28
Updated
2024-01-21
In OpenLDAP 2.x before 2.5.12 and 2.6.x before 2.6.2, a SQL injection vulnerability exists in the experimental back-sql backend to slapd, via a SQL statement within an LDAP query. This can occur during an LDAP search operation when the search filter is processed, due to a lack of proper escaping.
Max CVSS
9.8
EPSS Score
1.10%
Published
2022-05-04
Updated
2022-10-06
slapd in OpenLDAP 2.0 through 2.0.19 allows local users, and anonymous users before 2.0.8, to conduct a "replace" action on access controls without any values, which causes OpenLDAP to delete non-mandatory attributes that would otherwise be protected by ACLs.
Max CVSS
7.5
EPSS Score
0.31%
Published
2002-01-31
Updated
2017-10-10
Multiple buffer overflows in OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allow remote attackers to execute arbitrary code via (1) long -t or -r parameters to slurpd, (2) a malicious ldapfilter.conf file that is not properly handled by getfilter functions, (3) a malicious ldaptemplates.conf that causes an overflow in libldap, (4) a certain access control list that causes an overflow in slapd, or (5) a long generated filename for logging rejected replication requests.
Max CVSS
7.5
EPSS Score
5.83%
Published
2003-01-02
Updated
2017-07-11
OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allows remote or local attackers to execute arbitrary code when libldap reads the .ldaprc file within applications that are running with extra privileges.
Max CVSS
7.5
EPSS Score
0.23%
Published
2003-01-02
Updated
2008-09-10
OpenLDAP 1.0 through 2.1.19, as used in Apple Mac OS 10.3.4 and 10.3.5 and possibly other operating systems, may allow certain authentication schemes to use hashed (crypt) passwords in the userPassword attribute as if they were plaintext passwords, which allows remote attackers to re-use hashed passwords without decrypting them.
Max CVSS
7.5
EPSS Score
1.61%
Published
2004-09-07
Updated
2017-10-11
OpenLDAP before 2.3.29 allows remote attackers to cause a denial of service (daemon crash) via LDAP BIND requests with long authcid names, which triggers an assertion failure.
Max CVSS
7.5
EPSS Score
88.40%
Published
2006-11-07
Updated
2024-02-08
An off-by-one error leading to a crash was discovered in openldap 2.4 when processing DNS SRV messages. If slapd was configured to use the dnssrv backend, an attacker could crash the service with crafted DNS responses.
Max CVSS
7.5
EPSS Score
35.07%
Published
2020-01-02
Updated
2020-01-09
The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors.
Max CVSS
7.5
EPSS Score
0.29%
Published
2015-12-07
Updated
2023-04-28
contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation.
Max CVSS
7.5
EPSS Score
0.41%
Published
2017-12-18
Updated
2022-06-13
An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user.
Max CVSS
7.5
EPSS Score
0.16%
Published
2019-07-26
Updated
2022-06-13
In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters with nested boolean expressions can result in denial of service (daemon crash).
Max CVSS
7.5
EPSS Score
12.40%
Published
2020-04-28
Updated
2022-04-29
A NULL pointer dereference was found in OpenLDAP server and was fixed in openldap 2.4.55, during a request for renaming RDNs. An unauthenticated attacker could remotely crash the slapd process by sending a specially crafted request, causing a Denial of Service.
Max CVSS
7.5
EPSS Score
0.13%
Published
2020-12-08
Updated
2022-10-12
A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP’s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability.
Max CVSS
7.5
EPSS Score
0.91%
Published
2021-05-18
Updated
2021-09-14
A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23(). The highest threat from this vulnerability is to system availability.
Max CVSS
7.5
EPSS Score
2.04%
Published
2021-05-28
Updated
2021-09-14
An integer underflow was discovered in OpenLDAP before 2.4.57 leading to slapd crashes in the Certificate Exact Assertion processing, resulting in denial of service (schema_init.c serialNumberAndIssuerCheck).
Max CVSS
7.5
EPSS Score
5.73%
Published
2021-01-26
Updated
2022-04-13
A flaw was discovered in OpenLDAP before 2.4.57 leading to an assertion failure in slapd in the saslAuthzTo validation, resulting in denial of service.
Max CVSS
7.5
EPSS Score
4.51%
Published
2021-01-26
Updated
2022-04-13
A flaw was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Values Return Filter control handling, resulting in denial of service (double free and out-of-bounds read).
Max CVSS
7.5
EPSS Score
1.20%
Published
2021-01-26
Updated
2022-04-13
A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service.
Max CVSS
7.5
EPSS Score
1.34%
Published
2021-01-26
Updated
2022-04-13
A flaw was discovered in OpenLDAP before 2.4.57 leading to a double free and slapd crash in the saslAuthzTo processing, resulting in denial of service.
Max CVSS
7.5
EPSS Score
1.34%
Published
2021-01-26
Updated
2022-04-13
A flaw was discovered in OpenLDAP before 2.4.57 leading to a memch->bv_len miscalculation and slapd crash in the saslAuthzTo processing, resulting in denial of service.
Max CVSS
7.5
EPSS Score
0.39%
Published
2021-01-26
Updated
2022-04-13
A flaw was discovered in OpenLDAP before 2.4.57 leading to an infinite loop in slapd with the cancel_extop Cancel operation, resulting in denial of service.
Max CVSS
7.5
EPSS Score
7.96%
Published
2021-01-26
Updated
2022-04-13
An integer underflow was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Certificate List Exact Assertion processing, resulting in denial of service.
Max CVSS
7.5
EPSS Score
10.96%
Published
2021-01-26
Updated
2022-04-13
A flaw was discovered in ldap_X509dn2bv in OpenLDAP before 2.4.57 leading to a slapd crash in the X.509 DN parsing in ad_keystring, resulting in denial of service.
Max CVSS
7.5
EPSS Score
4.78%
Published
2021-01-26
Updated
2022-04-13
A flaw was discovered in OpenLDAP before 2.4.57 leading in an assertion failure in slapd in the X.509 DN parsing in decode.c ber_next_element, resulting in denial of service.
Max CVSS
7.5
EPSS Score
0.75%
Published
2021-01-26
Updated
2022-04-30
60 vulnerabilities found
1 2 3
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!