2024-12-08 03:06:42 +00:00

185 lines
6.0 KiB
JSON

{
"id": "CVE-2012-2134",
"sourceIdentifier": "secalert@redhat.com",
"published": "2014-02-26T15:55:08.877",
"lastModified": "2024-11-21T01:38:34.160",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The handle_connection_error function in ldap_helper.c in bind-dyndb-ldap before 1.1.0rc1 does not properly handle LDAP query errors, which allows remote attackers to cause a denial of service (infinite loop and named server hang) via a non-alphabet character in the base DN in an LDAP search DNS query."
},
{
"lang": "es",
"value": "La funci\u00f3n handle_connection_error en ldap_helper.c en bind-dyndb-ldap anterior a 1.1.0rc1 no maneja debidamente los errores de consulta LDAP, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicios (bucle infinito y cuelgue del servidor nombrado) a trav\u00e9s de un caracter no alfab\u00e9tico en la base DN en una consulta DNS de una b\u00fasqueda LDAP."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-399"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:martin_nagy:bind-dyndb-ldap:*:b2:*:*:*:*:*:*",
"versionEndIncluding": "1.1.0",
"matchCriteriaId": "E6CA1920-6C70-4875-ADED-1F15A4F2A8BB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:martin_nagy:bind-dyndb-ldap:0.1.0:a1:*:*:*:*:*:*",
"matchCriteriaId": "6EAFBB42-05EE-44DB-85D4-D622C2B678E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:martin_nagy:bind-dyndb-ldap:0.1.0:b:*:*:*:*:*:*",
"matchCriteriaId": "5745D406-24EF-408D-8A57-2AEEB09FF41C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:martin_nagy:bind-dyndb-ldap:0.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CA5463AE-3E88-4824-AB42-93B5E6FE8573"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:martin_nagy:bind-dyndb-ldap:1.0.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "D8BA67DA-D03F-499E-8BCF-94C06A814383"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:martin_nagy:bind-dyndb-ldap:1.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "1FA76B53-60B9-40D9-A1FC-41FE6CED3148"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:martin_nagy:bind-dyndb-ldap:1.1.0:a1:*:*:*:*:*:*",
"matchCriteriaId": "00063DB2-31C6-4580-AB99-72466B3FB33A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:martin_nagy:bind-dyndb-ldap:1.1.0:a2:*:*:*:*:*:*",
"matchCriteriaId": "374C3768-2379-4F82-8826-0B3EC53DA38C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:martin_nagy:bind-dyndb-ldap:1.1.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "E72C8313-8F0F-4826-B96D-2B08685521C4"
}
]
}
]
}
],
"references": [
{
"url": "http://rhn.redhat.com/errata/RHSA-2012-0683.html",
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "http://secunia.com/advisories/48901",
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/04/24/15",
"source": "secalert@redhat.com"
},
{
"url": "http://www.osvdb.org/81619",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=815846",
"source": "secalert@redhat.com"
},
{
"url": "https://git.fedorahosted.org/cgit/bind-dyndb-ldap.git/tree/NEWS",
"source": "secalert@redhat.com"
},
{
"url": "https://www.redhat.com/archives/freeipa-users/2012-April/msg00144.html",
"source": "secalert@redhat.com"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2012-0683.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://secunia.com/advisories/48901",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/04/24/15",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.osvdb.org/81619",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=815846",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.fedorahosted.org/cgit/bind-dyndb-ldap.git/tree/NEWS",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.redhat.com/archives/freeipa-users/2012-April/msg00144.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}