First published: Tue May 30 2017(Updated: )
servers/slapd/back-mdb/search.c in OpenLDAP through 2.4.44 is prone to a double free vulnerability. A user with access to search the directory can crash slapd by issuing a search including the Paged Results control with a page size of 0. Upstream patch: <a href="https://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=0cee1ffb6021b1aae3fcc9581699da1c85a6dd6e">https://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=0cee1ffb6021b1aae3fcc9581699da1c85a6dd6e</a>
Affected Software | Affected Version | How to fix |
---|---|---|
OpenLDAP | <=2.4.44 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1456712 is categorized as high due to the potential for denial of service.
To fix REDHAT-BUG-1456712, update OpenLDAP to version 2.4.45 or later, which contains the necessary patches.
Users with access to search the OpenLDAP directory prior to version 2.4.45 are affected by REDHAT-BUG-1456712.
REDHAT-BUG-1456712 describes a double free vulnerability in OpenLDAP that can cause the slapd daemon to crash.
REDHAT-BUG-1456712 can be exploited by sending a search request with the Paged Results control and a page size of 0.