CVE Vulnerabilities

CVE-2021-3480

NULL Pointer Dereference

Published: May 20, 2021 | Modified: Nov 07, 2023
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM

A flaw was found in slapi-nis in versions before 0.56.7. A NULL pointer dereference during the parsing of the Binding DN could allow an unauthenticated attacker to crash the 389-ds-base directory server. The highest threat from this vulnerability is to system availability.

Weakness

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

Affected Software

Name Vendor Start Version End Version
Slapi-nis Slapi-nis_project * 0.56.7 (excluding)
Red Hat Enterprise Linux 7 RedHat slapi-nis-0:0.56.5-4.el7_9 *
Red Hat Enterprise Linux 8 RedHat idm:DL1-8040020210416132749.5b01ab7e *
Red Hat Enterprise Linux 8.1 Extended Update Support RedHat idm:DL1-8010020210426160345.6573b795 *
Red Hat Enterprise Linux 8.2 Extended Update Support RedHat idm:DL1-8020020210426160405.792f4060 *
Slapi-nis Ubuntu bionic *
Slapi-nis Ubuntu groovy *
Slapi-nis Ubuntu hirsute *
Slapi-nis Ubuntu impish *
Slapi-nis Ubuntu kinetic *
Slapi-nis Ubuntu lunar *
Slapi-nis Ubuntu mantic *
Slapi-nis Ubuntu trusty *
Slapi-nis Ubuntu xenial *

Potential Mitigations

References