CVE-2013-4449

Related Vulnerabilities: CVE-2013-4449  

The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.

The MITRE CVE dictionary describes this issue as:

The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.

Find out more about CVE-2013-4449 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 4.3
Base Metrics AV:N/AC:M/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 6 (openldap) RHSA-2014:0126 2014-02-03
Red Hat Enterprise Linux 5 (openldap) RHSA-2014:0206 2014-02-24

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 7 openldap Not affected

Acknowledgements

Red Hat would like to thank Michael Vishchers from Seven Principles AG for reporting this issue.