Lucene search

K
cveRedhatCVE-2012-2134
HistoryFeb 26, 2014 - 3:55 p.m.

CVE-2012-2134

2014-02-2615:55:08
CWE-399
redhat
web.nvd.nist.gov
50
cve-2012-2134
bind-dyndb-ldap
ldap
denial of service
security vulnerability

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

AI Score

6.2

Confidence

Low

EPSS

0.012

Percentile

85.4%

The handle_connection_error function in ldap_helper.c in bind-dyndb-ldap before 1.1.0rc1 does not properly handle LDAP query errors, which allows remote attackers to cause a denial of service (infinite loop and named server hang) via a non-alphabet character in the base DN in an LDAP search DNS query.

Affected configurations

Nvd
Node
martin_nagybind-dyndb-ldapRange1.1.0b2
OR
martin_nagybind-dyndb-ldapMatch0.1.0a1
OR
martin_nagybind-dyndb-ldapMatch0.1.0b
OR
martin_nagybind-dyndb-ldapMatch0.2.0
OR
martin_nagybind-dyndb-ldapMatch1.0.0b1
OR
martin_nagybind-dyndb-ldapMatch1.0.0rc1
OR
martin_nagybind-dyndb-ldapMatch1.1.0a1
OR
martin_nagybind-dyndb-ldapMatch1.1.0a2
OR
martin_nagybind-dyndb-ldapMatch1.1.0b1
VendorProductVersionCPE
martin_nagybind-dyndb-ldap*cpe:2.3:a:martin_nagy:bind-dyndb-ldap:*:b2:*:*:*:*:*:*
martin_nagybind-dyndb-ldap0.1.0cpe:2.3:a:martin_nagy:bind-dyndb-ldap:0.1.0:a1:*:*:*:*:*:*
martin_nagybind-dyndb-ldap0.1.0cpe:2.3:a:martin_nagy:bind-dyndb-ldap:0.1.0:b:*:*:*:*:*:*
martin_nagybind-dyndb-ldap0.2.0cpe:2.3:a:martin_nagy:bind-dyndb-ldap:0.2.0:*:*:*:*:*:*:*
martin_nagybind-dyndb-ldap1.0.0cpe:2.3:a:martin_nagy:bind-dyndb-ldap:1.0.0:b1:*:*:*:*:*:*
martin_nagybind-dyndb-ldap1.0.0cpe:2.3:a:martin_nagy:bind-dyndb-ldap:1.0.0:rc1:*:*:*:*:*:*
martin_nagybind-dyndb-ldap1.1.0cpe:2.3:a:martin_nagy:bind-dyndb-ldap:1.1.0:a1:*:*:*:*:*:*
martin_nagybind-dyndb-ldap1.1.0cpe:2.3:a:martin_nagy:bind-dyndb-ldap:1.1.0:a2:*:*:*:*:*:*
martin_nagybind-dyndb-ldap1.1.0cpe:2.3:a:martin_nagy:bind-dyndb-ldap:1.1.0:b1:*:*:*:*:*:*

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

AI Score

6.2

Confidence

Low

EPSS

0.012

Percentile

85.4%