Executive Summary
Summary | |
---|---|
Title | OpenLDAP vulnerability |
Informations | |||
---|---|---|---|
Name | USN-384-1 | First vendor Publication | 2006-11-20 |
Vendor | Ubuntu | Last vendor Modification | 2006-11-20 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects the following Ubuntu releases: Ubuntu 5.10 Ubuntu 6.06 LTS Ubuntu 6.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.10: Ubuntu 6.06 LTS: Ubuntu 6.10: In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Evgeny Legerov discovered that the OpenLDAP libraries did not correctly truncate authcid names. This situation would trigger an assert and abort the program using the libraries. A remote attacker could send specially crafted bind requests that would lead to an LDAP server denial of service. |
Original Source
Url : http://www.ubuntu.com/usn/USN-384-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-617 | Reachable Assertion |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-10-10 | Name : SLES9: Security update for openldap2-client File : nvt/sles9p5020922.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200611-25 (openldap) File : nvt/glsa_200611_25.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
30226 | OpenLDAP SASL authcid Name BIND Request DoS |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | OpenLDAP BIND request denial of service attempt RuleID : 13425 - Revision : 6 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-09-24 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_11307.nasl - Type : ACT_GATHER_INFO |
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_openldap2-client-2291.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-384-1.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_openldap2-client-2282.nasl - Type : ACT_GATHER_INFO |
2007-02-18 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2006-208.nasl - Type : ACT_GATHER_INFO |
2007-02-18 | Name : The remote host is missing a vendor-supplied security patch File : suse_SA_2006_072.nasl - Type : ACT_GATHER_INFO |
2006-11-30 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200611-25.nasl - Type : ACT_GATHER_INFO |
2006-11-07 | Name : The remote LDAP server is prone to a denial of service attack. File : openldap_sasl_bind_dos.nasl - Type : ACT_DENIAL |
Alert History
Date | Informations |
---|---|
2014-02-17 12:03:57 |
|