First published: Thu Nov 19 2020(Updated: )
A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23(). The highest threat from this vulnerability is to system availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openldap | 2.4.47+dfsg-3+deb10u7 2.4.57+dfsg-3+deb11u1 2.5.13+dfsg-5 | |
redhat/openldap | <2.4.56 | 2.4.56 |
Openldap Openldap | <2.4.56 | |
Redhat Jboss Core Services | ||
Redhat Jboss Enterprise Application Platform | =5.0.0 | |
Redhat Jboss Enterprise Web Server | =2.0.0 | |
Redhat Enterprise Linux | =5.0 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Debian Debian Linux | =9.0 | |
Fedoraproject Fedora | =33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this flaw in OpenLDAP is CVE-2020-25710.
The severity rating of CVE-2020-25710 is 7.5 (High).
The highest threat from CVE-2020-25710 is to system availability.
Versions of OpenLDAP before 2.4.56 are affected by CVE-2020-25710.
You can find more information about CVE-2020-25710 at the following references: [Link 1](https://bugzilla.redhat.com/show_bug.cgi?id=1899678), [Link 2](https://git.openldap.org/openldap/openldap/-/commit/ab3915154e69920d480205b4bf5ccb2b391a0a1f#a2feb6ed0257c21c6672793ee2f94eaadc10c72c), [Link 3](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E).