mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
290 lines
10 KiB
JSON
290 lines
10 KiB
JSON
{
|
|
"id": "CVE-2015-1545",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2015-02-12T16:59:06.143",
|
|
"lastModified": "2017-09-08T01:29:49.747",
|
|
"vulnStatus": "Modified",
|
|
"evaluatorComment": "<a href=\"http://cwe.mitre.org/data/definitions/476.html\">CWE-476: NULL Pointer Dereference</a>",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The deref_parseCtrl function in servers/slapd/overlays/deref.c in OpenLDAP 2.4.13 through 2.4.40 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an empty attribute list in a deref control in a search request."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "La funci\u00f3n deref_parseCtrl en servers/slapd/overlays/deref.c en OpenLDAP 2.4.13 hasta 2.4.40 permite a atacantes remotos causar una denegaci\u00f3n de servicio (referencia a puntero nulo y ca\u00edda) a trav\u00e9s de una lista de atributos vac\u00eda en un control de referencia en una solicitud de b\u00fasqueda."
|
|
}
|
|
],
|
|
"vendorComments": [
|
|
{
|
|
"organization": "openldap.org",
|
|
"comment": "Note that the deref overlay is not enabled by default, so this vulnerability only affects sites that have explicitly configured their servers to load and enable the overlay. Since this overlay has never been documented, there are no sites outside of the OpenLDAP developer community with a legitimate reason to enable this module.",
|
|
"lastModified": "2015-02-25T11:33:12.727"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openldap:openldap:2.4.13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E99FB859-D023-4B2B-A709-05E83A46E2A1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openldap:openldap:2.4.14:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8D2EEBC7-1FAF-43E2-A124-C387C02D9E2B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openldap:openldap:2.4.15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "95D242E4-D5EB-4785-A6EF-60B1E8E2B0EC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openldap:openldap:2.4.16:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F6FEDD9C-FDF7-456A-B06C-0A4A4443991D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openldap:openldap:2.4.17:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9245CDE2-B90A-4D47-BA20-A7869FF0A645"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openldap:openldap:2.4.18:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FB993E4D-E573-4495-97DE-465DDB2AA2DF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openldap:openldap:2.4.19:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D0F106A3-63D5-4D07-9440-6628DBA78BE5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openldap:openldap:2.4.20:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "36CC03BC-DF34-43CD-90B0-27D23A1DD06A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openldap:openldap:2.4.21:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "16C90FEE-527E-47F5-8840-517A55163D8E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openldap:openldap:2.4.22:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0FAEA812-BB47-47A3-A975-B3B8D30DBA36"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openldap:openldap:2.4.23:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5DE5D180-3972-40A0-ADAF-A4F3364D1381"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openldap:openldap:2.4.24:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AD76F376-00D8-4917-BF68-6EECC316C331"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openldap:openldap:2.4.25:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F7063C11-3BF5-4037-ADC3-0C7E9AF830B4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openldap:openldap:2.4.26:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CAE258EA-1B57-4189-AD5A-7E2ACF223167"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openldap:openldap:2.4.27:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C492F5F5-A6FD-4BED-890A-79254138CC0A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openldap:openldap:2.4.28:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A6F7FDE8-2E54-4162-AA5F-D81253AAC8FA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openldap:openldap:2.4.29:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "693E3145-FDDB-4780-886B-6D7FC7B2C5B3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openldap:openldap:2.4.30:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1BF32056-CC6A-4B2B-8FAA-F573445B9B99"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openldap:openldap:2.4.31:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "93B99338-4A1A-4483-8308-49BCCB325C30"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openldap:openldap:2.4.32:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FE652CE3-E16B-4062-8253-F3FB52A651EA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openldap:openldap:2.4.33:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2A30ED6D-1DB8-4563-B131-1532F97F9694"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openldap:openldap:2.4.34:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7764366D-29BB-4D75-A33C-7C17DA7496DE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openldap:openldap:2.4.35:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0A38D99B-370E-430A-A657-CD9FF72D0863"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openldap:openldap:2.4.36:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AB3D3034-D938-402D-A02F-3F4005C438AA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openldap:openldap:2.4.37:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A7D979A0-3214-4DC6-A838-0AD2444CA5FD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openldap:openldap:2.4.38:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "25B3EF5D-7889-4206-838C-E932AFCBE15D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openldap:openldap:2.4.39:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6B20FA14-9F5B-425D-ACEF-A2348252C39A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openldap:openldap:2.4.40:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "43B01F94-261C-4718-A82D-28DAE9B67936"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://seclists.org/fulldisclosure/2019/Dec/26",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.debian.org/security/2015/dsa-3209",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:073",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:074",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=c32e74763f77675b9e144126e375977ed6dc562c",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.openldap.org/its/?findid=8027",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.openwall.com/lists/oss-security/2015/02/07/3",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/72519",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1032399",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776988",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100937",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://seclists.org/bugtraq/2019/Dec/23",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/HT204659",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/kb/HT210788",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |