CVE-2015-1545
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
12/02/2015
Last modified:
12/04/2025
Description
The deref_parseCtrl function in servers/slapd/overlays/deref.c in OpenLDAP 2.4.13 through 2.4.40 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an empty attribute list in a deref control in a search request.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:openldap:openldap:2.4.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openldap:openldap:2.4.14:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openldap:openldap:2.4.15:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openldap:openldap:2.4.16:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openldap:openldap:2.4.17:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openldap:openldap:2.4.18:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openldap:openldap:2.4.19:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openldap:openldap:2.4.20:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openldap:openldap:2.4.21:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openldap:openldap:2.4.22:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openldap:openldap:2.4.23:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openldap:openldap:2.4.24:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openldap:openldap:2.4.25:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openldap:openldap:2.4.26:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openldap:openldap:2.4.27:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html
- http://seclists.org/fulldisclosure/2019/Dec/26
- http://secunia.com/advisories/62787
- http://www.debian.org/security/2015/dsa-3209
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A073
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A074
- http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba%3Dcommit%3Bh%3Dc32e74763f77675b9e144126e375977ed6dc562c
- http://www.openldap.org/its/?findid=8027
- http://www.openwall.com/lists/oss-security/2015/02/07/3
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.securityfocus.com/bid/72519
- http://www.securitytracker.com/id/1032399
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776988
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100937
- https://seclists.org/bugtraq/2019/Dec/23
- https://support.apple.com/HT204659
- https://support.apple.com/kb/HT210788
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html
- http://seclists.org/fulldisclosure/2019/Dec/26
- http://secunia.com/advisories/62787
- http://www.debian.org/security/2015/dsa-3209
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A073
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A074
- http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba%3Dcommit%3Bh%3Dc32e74763f77675b9e144126e375977ed6dc562c
- http://www.openldap.org/its/?findid=8027
- http://www.openwall.com/lists/oss-security/2015/02/07/3
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.securityfocus.com/bid/72519
- http://www.securitytracker.com/id/1032399
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776988
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100937
- https://seclists.org/bugtraq/2019/Dec/23
- https://support.apple.com/HT204659
- https://support.apple.com/kb/HT210788



