MGASA-2014-0062

Source
https://advisories.mageia.org/MGASA-2014-0062.html
Import Source
https://advisories.mageia.org/MGASA-2014-0062.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0062
Related
Published
2014-02-12T17:20:43Z
Modified
2015-07-09T07:56:53Z
Summary
Updated openldap packages fix security vulnerability
Details

A denial of service flaw was found in the way the OpenLDAP server daemon (slapd) performed reference counting when using the rwm (rewrite/remap) overlay. A remote attacker able to query the OpenLDAP server could use this flaw to crash the server by immediately unbinding from the server after sending a search request (CVE-2013-4449).

References
Credits

Affected packages

Mageia:4 / openldap

Package

Name
openldap
Purl
pkg:rpm/mageia/openldap?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.38-1.1.mga4

Ecosystem specific

{
    "section": "core"
}

Mageia:3 / openldap

Package

Name
openldap
Purl
pkg:rpm/mageia/openldap?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.33-7.1.mga3

Ecosystem specific

{
    "section": "core"
}