Vulnerabilidad en petición LDAP con un atributo objectClasses en OpenLDAP (CVE-2007-5707)
Gravedad CVSS v2.0:
ALTA
Tipo:
CWE-399
Error en la gestión de recursos
Fecha de publicación:
30/10/2007
Última modificación:
09/04/2025
Descripción
OpenLDAP versiones anteriores a 2.3.39, permite a atacantes remotos causar una denegación de servicio (bloqueo de slapd) por medio de una petición LDAP con un atributo objectClasses malformado. NOTA: esto ha sido reportado como doble liberación, pero los reportes son incoherentes.
Impacto
Puntuación base 2.0
7.10
Gravedad 2.0
ALTA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:openldap:openldap:1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:openldap:openldap:1.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:openldap:openldap:1.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:openldap:openldap:1.0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:openldap:openldap:1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:openldap:openldap:1.1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:openldap:openldap:1.1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:openldap:openldap:1.1.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:openldap:openldap:1.1.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:openldap:openldap:1.1.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:openldap:openldap:1.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:openldap:openldap:1.2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:openldap:openldap:1.2.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:openldap:openldap:1.2.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:openldap:openldap:1.2.3:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=440632
- http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
- http://secunia.com/advisories/27424
- http://secunia.com/advisories/27587
- http://secunia.com/advisories/27596
- http://secunia.com/advisories/27683
- http://secunia.com/advisories/27756
- http://secunia.com/advisories/27868
- http://secunia.com/advisories/29461
- http://secunia.com/advisories/29682
- http://security.gentoo.org/glsa/glsa-200803-28.xml
- http://support.apple.com/kb/HT3937
- http://www.debian.org/security/2008/dsa-1541
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A215
- http://www.novell.com/linux/security/advisories/2007_24_sr.html
- http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5119
- http://www.openldap.org/lists/openldap-announce/200710/msg00001.html
- http://www.redhat.com/archives/fedora-package-announce/2007-November/msg00460.html
- http://www.redhat.com/support/errata/RHSA-2007-1037.html
- http://www.redhat.com/support/errata/RHSA-2007-1038.html
- http://www.securityfocus.com/bid/26245
- http://www.securitytracker.com/id?1018924=
- http://www.ubuntu.com/usn/usn-551-1
- http://www.vupen.com/english/advisories/2007/3645
- http://www.vupen.com/english/advisories/2009/3184
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10183
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=440632
- http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
- http://secunia.com/advisories/27424
- http://secunia.com/advisories/27587
- http://secunia.com/advisories/27596
- http://secunia.com/advisories/27683
- http://secunia.com/advisories/27756
- http://secunia.com/advisories/27868
- http://secunia.com/advisories/29461
- http://secunia.com/advisories/29682
- http://security.gentoo.org/glsa/glsa-200803-28.xml
- http://support.apple.com/kb/HT3937
- http://www.debian.org/security/2008/dsa-1541
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A215
- http://www.novell.com/linux/security/advisories/2007_24_sr.html
- http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5119
- http://www.openldap.org/lists/openldap-announce/200710/msg00001.html
- http://www.redhat.com/archives/fedora-package-announce/2007-November/msg00460.html
- http://www.redhat.com/support/errata/RHSA-2007-1037.html
- http://www.redhat.com/support/errata/RHSA-2007-1038.html
- http://www.securityfocus.com/bid/26245
- http://www.securitytracker.com/id?1018924=
- http://www.ubuntu.com/usn/usn-551-1
- http://www.vupen.com/english/advisories/2007/3645
- http://www.vupen.com/english/advisories/2009/3184
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10183