First published: Tue Oct 15 2013(Updated: )
It was discovered that OpenLDAP, with the rwm overlay to slapd, could segfault if a user were able to query the directory and immediately unbind from the server. This seems to be due to the rwm overlay not doing reference counting properly, so rwm_conn_destroy frees the session context while rwm_op_search is using it. This condition also seems to require multiple cores/CPUs to trigger. This was also reported upstream [1] and is currently unfixed. [1] <a href="http://www.openldap.org/its/index.cgi/Incoming?id=7723">http://www.openldap.org/its/index.cgi/Incoming?id=7723</a>
Credit: CVE-2012-1164 CVE-2012-2668 CVE-2013-4449 CVE-2015-1545 CVE-2019-13057 CVE-2019-13565 secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Openldap Openldap | <=2.4.36 | |
Openldap Openldap | =2.4.6 | |
Openldap Openldap | =2.4.7 | |
Openldap Openldap | =2.4.8 | |
Openldap Openldap | =2.4.9 | |
Openldap Openldap | =2.4.10 | |
Openldap Openldap | =2.4.11 | |
Openldap Openldap | =2.4.12 | |
Openldap Openldap | =2.4.13 | |
Openldap Openldap | =2.4.14 | |
Openldap Openldap | =2.4.15 | |
Openldap Openldap | =2.4.16 | |
Openldap Openldap | =2.4.17 | |
Openldap Openldap | =2.4.18 | |
Openldap Openldap | =2.4.19 | |
Openldap Openldap | =2.4.20 | |
Openldap Openldap | =2.4.21 | |
Openldap Openldap | =2.4.22 | |
Openldap Openldap | =2.4.23 | |
Openldap Openldap | =2.4.24 | |
Openldap Openldap | =2.4.25 | |
Openldap Openldap | =2.4.26 | |
Openldap Openldap | =2.4.27 | |
Openldap Openldap | =2.4.28 | |
Openldap Openldap | =2.4.29 | |
Openldap Openldap | =2.4.30 | |
Openldap Openldap | =2.4.31 | |
Openldap Openldap | =2.4.32 | |
Openldap Openldap | =2.4.33 | |
Openldap Openldap | =2.4.34 | |
Openldap Openldap | =2.4.35 | |
Apple macOS Catalina | <10.15.2 | 10.15.2 |
Apple Mojave | ||
Apple High Sierra | ||
debian/openldap | 2.4.57+dfsg-3+deb11u1 2.5.13+dfsg-5 2.5.18+dfsg-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2013-4449 is high.
To fix CVE-2013-4449 on macOS Catalina, update to OpenLDAP version 2.4.28 or later.
To fix CVE-2013-4449 on macOS Mojave, update to OpenLDAP version 2.4.28 or later.
To fix CVE-2013-4449 on macOS High Sierra, update to OpenLDAP version 2.4.28 or later.
You can find more information about CVE-2013-4449 at the following reference: [Apple Support](https://support.apple.com/en-us/HT210788)