CVE Vulnerabilities

CVE-2013-4449

Published: Feb 05, 2014 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
4.3 MODERATE
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.

Affected Software

NameVendorStart VersionEnd Version
Debian_linuxDebian7.0 (including)7.0 (including)
Debian_linuxDebian8.0 (including)8.0 (including)
Red Hat Enterprise Linux 5RedHatopenldap-0:2.3.43-27.el5_10*
Red Hat Enterprise Linux 6RedHatopenldap-0:2.4.23-34.el6_5.1*
OpenldapUbuntudevel*
OpenldapUbuntuesm-infra-legacy/trusty*
OpenldapUbuntulucid*
OpenldapUbuntuprecise*
OpenldapUbuntuquantal*
OpenldapUbunturaring*
OpenldapUbuntusaucy*
OpenldapUbuntutrusty*
OpenldapUbuntutrusty/esm*
OpenldapUbuntuupstream*
OpenldapUbuntuutopic*
OpenldapUbuntuvivid*
OpenldapUbuntuvivid/stable-phone-overlay*
OpenldapUbuntuvivid/ubuntu-core*

References