First published: Mon Jan 25 2021(Updated: )
A flaw was discovered in OpenLDAP before 2.4.57 leading to a double free and slapd crash in the saslAuthzTo processing, resulting in denial of service.
Credit: CVE-2020-36226 CVE-2020-36229 CVE-2020-36225 CVE-2020-36224 CVE-2020-36223 CVE-2020-36227 CVE-2020-36228 CVE-2020-36221 CVE-2020-36222 CVE-2020-36230 CVE-2020-36226 CVE-2020-36229 CVE-2020-36225 CVE-2020-36224 CVE-2020-36223 CVE-2020-36227 CVE-2020-36228 CVE-2020-36221 CVE-2020-36222 CVE-2020-36230 cve@mitre.org CVE-2020-36226 CVE-2020-36227 CVE-2020-36223 CVE-2020-36224 CVE-2020-36225 CVE-2020-36221 CVE-2020-36228 CVE-2020-36222 CVE-2020-36230 CVE-2020-36229
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openldap | 2.4.47+dfsg-3+deb10u7 2.4.57+dfsg-3+deb11u1 2.5.13+dfsg-5 | |
Apple Catalina | ||
Apple Mojave | ||
Openldap Openldap | <2.4.57 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Apple macOS | >=11.1<11.4 | |
Apple macOS Big Sur | <11.4 | 11.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-36225 is a vulnerability in OpenLDAP that has been addressed with improved checks.
The affected software versions are macOS Big Sur up to version 11.4, Mojave, and Catalina.
To fix CVE-2020-36225, ensure that you have updated your macOS to the latest version as recommended by Apple.
You can find more information about CVE-2020-36225 in the following references provided by Apple: [Reference 1](https://support.apple.com/en-us/HT212530), [Reference 2](https://support.apple.com/en-us/HT212529), [Reference 3](https://support.apple.com/en-us/HT212531).
The severity of CVE-2020-36225 is not mentioned in the given information.