Lucene search

K
f5F5F5:K16882
HistoryJul 02, 2015 - 12:00 a.m.

K16882 : OpenLDAP vulnerability CVE-2013-4449

2015-07-0200:00:00
my.f5.com
12

8 High

AI Score

Confidence

High

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.94 High

EPSS

Percentile

99.0%

Security Advisory Description

Description

The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search. (CVE-2013-4449)

Impact

None. F5 products are not affected by this vulnerability.

Status

To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:

Product Versions known to be vulnerable Versions known to be not vulnerable Severity Vulnerable component or feature
BIG-IP LTM None
11.0.0 - 11.6.0
10.1.0 - 10.2.4
Not vulnerable None
BIG-IP AAM None 11.4.0 - 11.6.0
Not vulnerable None
BIG-IP AFM None 11.3.0 - 11.6.0
Not vulnerable None
BIG-IP Analytics None 11.0.0 - 11.6.0
Not vulnerable None
BIG-IP APM None 11.0.0 - 11.6.0
10.1.0 - 10.2.4
Not vulnerable None
BIG-IP ASM None 11.0.0 - 11.6.0
10.1.0 - 10.2.4
Not vulnerable None
BIG-IP Edge Gateway
None 11.0.0 - 11.3.0
10.1.0 - 10.2.4
Not vulnerable None
BIG-IP GTM None 11.0.0 - 11.6.0
10.1.0 - 10.2.4
Not vulnerable None
BIG-IP Link Controller None
11.0.0 - 11.6.0
10.1.0 - 10.2.4
Not vulnerable None
BIG-IP PEM None
11.3.0 - 11.6.0
Not vulnerable None
BIG-IP PSM None 11.0.0 - 11.4.1
10.1.0 - 10.2.4
Not vulnerable None
BIG-IP WebAccelerator None 11.0.0 - 11.3.0
10.1.0 - 10.2.4
Not vulnerable None
BIG-IP WOM None 11.0.0 - 11.3.0
10.1.0 - 10.2.4
Not vulnerable None
ARX None 6.0.0 - 6.4.0
Not vulnerable None
Enterprise Manager None 3.0.0 - 3.1.1
Not vulnerable None
FirePass None 7.0.0
6.0.0 - 6.1.0
Not vulnerable None
BIG-IQ Cloud None
4.0.0 - 4.5.0
Not vulnerable None
BIG-IQ Device None
4.2.0 - 4.5.0
Not vulnerable None
BIG-IQ Security None
4.0.0 - 4.5.0
Not vulnerable None
BIG-IQ ADC None
4.5.0
Not vulnerable None
LineRate None
2.5.0 - 2.6.0
Not vulnerable None
F5 WebSafe None
1.0.0
Not vulnerable None
Traffix SDC None
4.0.0 - 4.4.0
3.3.2 - 3.5.1
Not vulnerable None

Note: As of February 17, 2015, AskF5 Security Advisory articles include the Severity value. Security Advisory articles published before this date do not list a Severity value.

Recommended Action

None

Supplemental Information

8 High

AI Score

Confidence

High

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.94 High

EPSS

Percentile

99.0%