CVE-2012-1164
Published: 29 June 2012
slapd in OpenLDAP before 2.4.30 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an LDAP search query with attrsOnly set to true, which causes empty attributes to be returned.
Notes
Author | Note |
---|---|
jdstrand | Per Debian bug report, you have to be using slapo-translucent and slapo-rwm, so downgrading to 'low' |
Priority
Status
Package | Release | Status |
---|---|---|
openldap Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Ignored
(end of life)
|
|
maverick |
Ignored
(end of life)
|
|
natty |
Ignored
(end of life)
|
|
oneiric |
Ignored
(end of life)
|
|
precise |
Released
(2.4.28-1.1ubuntu4.5)
|
|
quantal |
Not vulnerable
(2.4.31-1ubuntu2)
|
|
raring |
Not vulnerable
(2.4.31-1ubuntu2)
|
|
saucy |
Not vulnerable
(2.4.31-1ubuntu2)
|
|
trusty |
Not vulnerable
(2.4.31-1ubuntu2)
|
|
upstream |
Released
(2.4.29)
|
|
utopic |
Not vulnerable
(2.4.31-1ubuntu2)
|
|
vivid |
Not vulnerable
(2.4.31-1ubuntu2)
|
|
Patches: other: http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=ef2f5263de8802794e528cc2648ecfca369302ae other: http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=430256fafb85028443d7964a5ab1f4bbf8b2db38 other: http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=463c1fa25d45e393dc1f1ea235286f79e872fad0 |