← Volver a CVEs
CVE-2020-36224
HIGH7.5
Descripcion
A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service.
Detalles CVE
Puntuacion CVSS v3.17.5
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado1/26/2021
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
apple:mac_os_xapple:macosdebian:debian_linuxopenldap:openldap
Debilidades (CWE)
CWE-763
Referencias
http://seclists.org/fulldisclosure/2021/May/64(cve@mitre.org)
http://seclists.org/fulldisclosure/2021/May/65(cve@mitre.org)
http://seclists.org/fulldisclosure/2021/May/70(cve@mitre.org)
https://bugs.openldap.org/show_bug.cgi?id=9409(cve@mitre.org)
https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65(cve@mitre.org)
https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26(cve@mitre.org)
https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439(cve@mitre.org)
https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8(cve@mitre.org)
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E(cve@mitre.org)
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E(cve@mitre.org)
https://security.netapp.com/advisory/ntap-20210226-0002/(cve@mitre.org)
https://support.apple.com/kb/HT212529(cve@mitre.org)
https://support.apple.com/kb/HT212530(cve@mitre.org)
https://support.apple.com/kb/HT212531(cve@mitre.org)
https://www.debian.org/security/2021/dsa-4845(cve@mitre.org)
http://seclists.org/fulldisclosure/2021/May/64(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2021/May/65(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2021/May/70(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.openldap.org/show_bug.cgi?id=9409(af854a3a-2127-422b-91ae-364da2661108)
https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65(af854a3a-2127-422b-91ae-364da2661108)
https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26(af854a3a-2127-422b-91ae-364da2661108)
https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439(af854a3a-2127-422b-91ae-364da2661108)
https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8(af854a3a-2127-422b-91ae-364da2661108)
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20210226-0002/(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/kb/HT212529(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/kb/HT212530(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/kb/HT212531(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2021/dsa-4845(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.