First published: Wed May 06 2020(Updated: )
It was discovered that OpenLDAP incorrectly handled certain queries. A remote attacker could possibly use this issue to cause OpenLDAP to consume resources, resulting in a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/slapd | <2.4.49+dfsg-2ubuntu1.2 | 2.4.49+dfsg-2ubuntu1.2 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/slapd | <2.4.48+dfsg-1ubuntu1.1 | 2.4.48+dfsg-1ubuntu1.1 |
Ubuntu Ubuntu | =19.10 | |
All of | ||
ubuntu/slapd | <2.4.45+dfsg-1ubuntu1.5 | 2.4.45+dfsg-1ubuntu1.5 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/slapd | <2.4.42+dfsg-2ubuntu3.8 | 2.4.42+dfsg-2ubuntu3.8 |
Ubuntu Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this OpenLDAP vulnerability is USN-4352-1.
This OpenLDAP vulnerability allows a remote attacker to cause a denial of service by consuming resources.
This OpenLDAP vulnerability affects Ubuntu versions 20.04, 19.10, 18.04, and 16.04.
To fix this OpenLDAP vulnerability, update the slapd package to version 2.4.49+dfsg-2ubuntu1.2 for Ubuntu 20.04, version 2.4.48+dfsg-1ubuntu1.1 for Ubuntu 19.10, version 2.4.45+dfsg-1ubuntu1.5 for Ubuntu 18.04, and version 2.4.42+dfsg-2ubuntu3.8 for Ubuntu 16.04.
You can find more information about this OpenLDAP vulnerability at the following references: CVE-2020-12243, USN-4352-2, and the Ubuntu Security Notices.