Lucene search

K
amazonAmazonALAS-2014-294
HistoryFeb 26, 2014 - 4:22 p.m.

Medium: openldap

2014-02-2616:22:00
alas.aws.amazon.com
12

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.94 High

EPSS

Percentile

99.1%

Issue Overview:

The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.

Affected Packages:

openldap

Issue Correction:
Run yum update openldap to update your system.

New Packages:

i686:  
    openldap-servers-sql-2.4.23-34.23.amzn1.i686  
    openldap-devel-2.4.23-34.23.amzn1.i686  
    openldap-debuginfo-2.4.23-34.23.amzn1.i686  
    openldap-2.4.23-34.23.amzn1.i686  
    openldap-servers-2.4.23-34.23.amzn1.i686  
    openldap-clients-2.4.23-34.23.amzn1.i686  
  
src:  
    openldap-2.4.23-34.23.amzn1.src  
  
x86_64:  
    openldap-servers-2.4.23-34.23.amzn1.x86_64  
    openldap-clients-2.4.23-34.23.amzn1.x86_64  
    openldap-devel-2.4.23-34.23.amzn1.x86_64  
    openldap-debuginfo-2.4.23-34.23.amzn1.x86_64  
    openldap-2.4.23-34.23.amzn1.x86_64  
    openldap-servers-sql-2.4.23-34.23.amzn1.x86_64  

Additional References

Red Hat: CVE-2013-4449

Mitre: CVE-2013-4449

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.94 High

EPSS

Percentile

99.1%