First published: Wed Nov 04 2020(Updated: )
OpenLDAP is vulnerable to a denial of service, caused by a NULL pointer dereference. By sending a specially crafted TCP packet, a remote attacker could exploit this vulnerability to cause slapd to crash.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Cloud Pak for Security (CP4S) | <=1.7.2.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.1.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.0.0 | |
Openldap Openldap | <2.4.55 | |
Redhat Enterprise Linux | =5.0 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Netapp Cloud Backup | ||
Netapp Solidfire Baseboard Management Controller Firmware | ||
Netapp Solidfire Baseboard Management Controller | ||
redhat/openldap | <2.4.55 | 2.4.55 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25692 is a vulnerability found in OpenLDAP server that allows an unauthenticated attacker to remotely crash the slapd process, causing a Denial of Service.
CVE-2020-25692 affects OpenLDAP server versions up to and including 2.4.55.
CVE-2020-25692 has a severity rating of 7.5, which is considered high.
To fix CVE-2020-25692, you need to update to OpenLDAP version 2.4.55 or higher.
You can find more information about CVE-2020-25692 in the following references: [Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=1894567), [NetApp Security Advisory](https://security.netapp.com/advisory/ntap-20210108-0006/), [IBM X-Force Exchange](https://exchange.xforce.ibmcloud.com/vulnerabilities/191968).