Lucene search

K
ubuntuUbuntuUSN-305-1
HistoryJun 27, 2006 - 12:00 a.m.

OpenLDAP vulnerability

2006-06-2700:00:00
ubuntu.com
32

7.5 High

AI Score

Confidence

Low

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.016 Low

EPSS

Percentile

87.1%

Releases

  • Ubuntu 6.06
  • Ubuntu 5.10
  • Ubuntu 5.04

Details

When processing overly long host names in OpenLDAP’s slurpd replication
server, a buffer overflow caused slurpd to crash.

If an attacker manages to inject a specially crafted host name into
slurpd, this might also be exploited to execute arbitrary code with
slurpd’s privileges; however, since slurpd is usually set up to
replicate only trusted machines, this should not be exploitable in
normal cases.

OSVersionArchitecturePackageVersionFilename
Ubuntu6.06noarchslapd< 2.2.26-5ubuntu2.1UNKNOWN
Ubuntu5.10noarchslapd< 2.2.26-3ubuntu0.1UNKNOWN
Ubuntu5.04noarchslapd< 2.1.30-3ubuntu3.2UNKNOWN

7.5 High

AI Score

Confidence

Low

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.016 Low

EPSS

Percentile

87.1%