5
CVSSv2

CVE-2012-3429

Published: 07/08/2012 Updated: 29/08/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The dns_to_ldap_dn_escape function in src/ldap_convert.c in bind-dyndb-ldap 1.1.0rc1 and previous versions does not properly escape distinguished names (DN) for LDAP queries, which allows remote DNS servers to cause a denial of service (named service hang) via a "$" character in a DN in a DNS query.

Vulnerable Product Search on Vulmon Subscribe to Product

martin nagy bind-dyndb-ldap 1.0.0

martin nagy bind-dyndb-ldap 1.1.0

martin nagy bind-dyndb-ldap 0.1.0

martin nagy bind-dyndb-ldap

martin nagy bind-dyndb-ldap 0.2.0

Vendor Advisories

Synopsis Important: bind-dyndb-ldap security update Type/Severity Security Advisory: Important Topic An updated bind-dyndb-ldap package that fixes one security issue is nowavailable for Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as havingimportant security impact A ...