Input validation error in Debian Linux and OpenLDAP - CVE-2013-4449

 

Input validation error in Debian Linux and OpenLDAP - CVE-2013-4449

Published: February 5, 2014 / Updated: August 10, 2020


Vulnerability identifier: #VU42072
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2013-4449
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Debian
OpenLDAP.org
Affected software:
Debian Linux
OpenLDAP

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.


How to mitigate CVE-2013-4449

Install update from vendor's website.

Sources