CVE Vulnerabilities

CVE-2020-36224

Release of Invalid Pointer or Reference

Published: Jan 26, 2021 | Modified: Nov 07, 2023
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM

A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service.

Weakness

The product attempts to return a memory resource to the system, but it calls the wrong release function or calls the appropriate release function incorrectly.

Affected Software

Name Vendor Start Version End Version
Openldap Openldap * 2.4.57 (excluding)
Openldap Ubuntu bionic *
Openldap Ubuntu devel *
Openldap Ubuntu esm-infra-legacy/trusty *
Openldap Ubuntu focal *
Openldap Ubuntu groovy *
Openldap Ubuntu hirsute *
Openldap Ubuntu impish *
Openldap Ubuntu jammy *
Openldap Ubuntu kinetic *
Openldap Ubuntu lunar *
Openldap Ubuntu mantic *
Openldap Ubuntu noble *
Openldap Ubuntu oracular *
Openldap Ubuntu precise/esm *
Openldap Ubuntu trusty *
Openldap Ubuntu trusty/esm *
Openldap Ubuntu upstream *
Openldap Ubuntu xenial *

Extended Description

This weakness can take several forms, such as:

Potential Mitigations

  • Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, glibc in Linux provides protection against free of invalid pointers.

References