CVE-2013-4449
Published: 5 February 2014
The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.
Priority
Status
Package | Release | Status |
---|---|---|
openldap Launchpad, Ubuntu, Debian |
lucid |
Ignored
(end of life)
|
precise |
Released
(2.4.28-1.1ubuntu4.5)
|
|
quantal |
Ignored
(end of life)
|
|
raring |
Ignored
(end of life)
|
|
saucy |
Ignored
(end of life)
|
|
trusty |
Released
(2.4.31-1+nmu2ubuntu8.1)
|
|
upstream |
Released
(2.4.39-1.1)
|
|
utopic |
Released
(2.4.31-1+nmu2ubuntu11.1)
|
|
vivid |
Released
(2.4.31-1+nmu2ubuntu12.1)
|
|
Patches: upstream: http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=924389d9dd9dbb6ffe5db6c0fc65ecfe6814a1af |