Lucene search

K
redosRedosROS-20211223-03
HistoryDec 23, 2021 - 12:00 a.m.

ROS-20211223-03

2021-12-2300:00:00
redos.red-soft.ru
39

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.243 Low

EPSS

Percentile

96.5%

Vulnerability in an open source implementation of the OpenLDAP protocol is related to a reachability assertion. Exploitation
exploitation of the vulnerability could allow an attacker acting remotely to send a specially crafted packet with a short timestamp to slapd and perform a denial of service (DoS) attack.
packet with a short timestamp and perform a denial of service (DoS) attack.

A vulnerability in the open source implementation of the OpenLDAP protocol involves the release of an invalid pointer or
link. Exploitation of the vulnerability could allow an attacker acting remotely to send an ad hoc
request to slapd and perform a denial of service (DoS) attack.

A vulnerability in the open source implementation of the OpenLDAP protocol is related to an infinite loop in the cancel_extop operation.
Exploitation of the vulnerability could allow an attacker acting remotely to send an ad hoc request
and execute a denial of service condition.

A vulnerability in the open source implementation of the OpenLDAP protocol is related to a resource management error. Exploitation
vulnerability could allow an attacker acting remotely to send a special request to slapd and
perform a denial of service (DoS) attack.

A vulnerability in an open source implementation of the OpenLDAP protocol is related to a double memory release during the
processing a return value filter control. Exploitation of the vulnerability could allow
an attacker acting remotely to send a special request to slapd and perform a denial of service (DoS) attack.
denial of service (DoS) attack.

The vulnerability in the open source implementation of the OpenLDAP protocol is related to an achievable assertion in syntactic
analysis. Exploitation of the vulnerability could allow an attacker acting remotely to send a special request to slapd and perform a denial of service (DoS) attack.
a special request to slapd and perform a denial of service (DoS) attack.

The vulnerability in the open source implementation of the OpenLDAP protocol is related to double memory freeing. Exploitation
vulnerability could allow a remote attacker to send a special request to slapd and perform a denial of service (DoS) attack.
perform a denial of service (DoS) attack.

A vulnerability in the open source implementation of the OpenLDAP protocol is related to integer depletion when processing the
accurate certificate list assertion. Exploitation of the vulnerability could allow an attacker,
acting remotely, send a special request to a vulnerable application, cause an integer
underflow and cause slapd to fail.

A vulnerability in an open source implementation of the OpenLDAP protocol is related to integer depletion. Exploitation of the
vulnerability could allow an attacker acting remotely to send a special request to a vulnerable application, cause an integer underflow, and cause slapd to crash.
application, cause an integer underflow, and cause slapd to crash.

A vulnerability in the open source implementation of the OpenLDAP protocol is related to accessing a resource using an
an incompatible type. Exploitation of the vulnerability could allow an attacker acting remotely,
to send a special request to slapd and perform a denial of service (DoS) attack.

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64openldap<= 2.4.55-6UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.243 Low

EPSS

Percentile

96.5%