CVE Vulnerabilities

CVE-2021-3480

NULL Pointer Dereference

Published: May 20, 2021 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A flaw was found in slapi-nis in versions before 0.56.7. A NULL pointer dereference during the parsing of the Binding DN could allow an unauthenticated attacker to crash the 389-ds-base directory server. The highest threat from this vulnerability is to system availability.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
Slapi-nisSlapi-nis_project*0.56.7 (excluding)
Red Hat Enterprise Linux 7RedHatslapi-nis-0:0.56.5-4.el7_9*
Red Hat Enterprise Linux 8RedHatidm:DL1-8040020210416132749.5b01ab7e*
Red Hat Enterprise Linux 8.1 Extended Update SupportRedHatidm:DL1-8010020210426160345.6573b795*
Red Hat Enterprise Linux 8.2 Extended Update SupportRedHatidm:DL1-8020020210426160405.792f4060*
Slapi-nisUbuntubionic*
Slapi-nisUbuntufocal*
Slapi-nisUbuntugroovy*
Slapi-nisUbuntuhirsute*
Slapi-nisUbuntuimpish*
Slapi-nisUbuntukinetic*
Slapi-nisUbuntulunar*
Slapi-nisUbuntumantic*
Slapi-nisUbuntuoracular*
Slapi-nisUbuntuplucky*
Slapi-nisUbuntutrusty*
Slapi-nisUbuntuxenial*

Potential Mitigations

References