6.8
CVSSv2

CVE-2013-0288

Published: 05/03/2013 Updated: 13/02/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

nss-pam-ldapd prior to 0.7.18 and 0.8.x prior to 0.8.11 allows context-dependent malicious users to cause a denial of service (application crash) and possibly execute arbitrary code by performing a name lookup on an application with a large number of open file descriptors, which triggers a stack-based buffer overflow related to incorrect use of the FD_SET macro.

Vulnerable Product Search on Vulmon Subscribe to Product

arthurdejong nss-pam-ldapd 0.8.2

arthurdejong nss-pam-ldapd 0.8.9

arthurdejong nss-pam-ldapd 0.8.7

arthurdejong nss-pam-ldapd 0.8.1

arthurdejong nss-pam-ldapd 0.8.5

arthurdejong nss-pam-ldapd 0.8.3

arthurdejong nss-pam-ldapd 0.8.0

arthurdejong nss-pam-ldapd 0.8.10

arthurdejong nss-pam-ldapd 0.8.4

arthurdejong nss-pam-ldapd 0.8.6

arthurdejong nss-pam-ldapd 0.8.8

arthurdejong nss-pam-ldapd 0.2.1

arthurdejong nss-pam-ldapd 0.6.10

arthurdejong nss-pam-ldapd 0.6.5

arthurdejong nss-pam-ldapd 0.7.10

arthurdejong nss-pam-ldapd 0.7.7

arthurdejong nss-pam-ldapd 0.7.15

arthurdejong nss-pam-ldapd 0.6.8

arthurdejong nss-pam-ldapd 0.6.7.1

arthurdejong nss-pam-ldapd 0.7.8

arthurdejong nss-pam-ldapd 0.6.0

arthurdejong nss-pam-ldapd 0.2

arthurdejong nss-pam-ldapd 0.6.4

arthurdejong nss-pam-ldapd 0.4.1

arthurdejong nss-pam-ldapd 0.6.12

arthurdejong nss-pam-ldapd 0.7.4

arthurdejong nss-pam-ldapd 0.7.12

arthurdejong nss-pam-ldapd 0.6.7.2

arthurdejong nss-pam-ldapd 0.7.1

arthurdejong nss-pam-ldapd 0.7.16

arthurdejong nss-pam-ldapd 0.5

arthurdejong nss-pam-ldapd 0.6.9

arthurdejong nss-pam-ldapd 0.4

arthurdejong nss-pam-ldapd 0.7.5

arthurdejong nss-pam-ldapd 0.7.14

arthurdejong nss-pam-ldapd 0.1

arthurdejong nss-pam-ldapd 0.6.2

arthurdejong nss-pam-ldapd 0.7.11

arthurdejong nss-pam-ldapd 0.6.3

arthurdejong nss-pam-ldapd 0.7.2

arthurdejong nss-pam-ldapd

arthurdejong nss-pam-ldapd 0.7.9

arthurdejong nss-pam-ldapd 0.6.11

arthurdejong nss-pam-ldapd 0.6.7

arthurdejong nss-pam-ldapd 0.7.0

arthurdejong nss-pam-ldapd 0.7.3

arthurdejong nss-pam-ldapd 0.6

arthurdejong nss-pam-ldapd 0.6.6

arthurdejong nss-pam-ldapd 0.3

arthurdejong nss-pam-ldapd 0.7.13

arthurdejong nss-pam-ldapd 0.6.1

arthurdejong nss-pam-ldapd 0.7.6

Vendor Advisories

Synopsis Important: nss-pam-ldapd security update Type/Severity Security Advisory: Important Topic Updated nss-pam-ldapd packages that fix one security issue are nowavailable for Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as havingimportant security impact A Common ...
Debian Bug report logs - #690319 lookup fail to contact nslcd when first 1024 filedescriptor are already used (select) Package: nss-pam-ldapd; Maintainer for nss-pam-ldapd is Arthur de Jong <adejong@debianorg>; Reported by: Adrien Urban <adrienurban@nbs-systemcom> Date: Fri, 12 Oct 2012 14:12:01 UTC Severity: crit ...
Garth Mollett discovered that a file descriptor overflow issue in the use of FD_SET() in nss-pam-ldapd, which provides NSS and PAM modules for using LDAP as a naming service, can lead to a stack-based buffer overflow An attacker could, under some circumstances, use this flaw to cause a process that has the NSS or PAM module loaded to crash or pote ...