Vulnerability Name: | CVE-2006-5779 (CCN-30076) |
Assigned: | 2006-11-06 |
Published: | 2006-11-06 |
Updated: | 2018-10-17 |
Summary: | OpenLDAP before 2.3.29 allows remote attackers to cause a denial of service (daemon crash) via LDAP BIND requests with long authcid names, which triggers an assertion failure.
|
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Low |
|
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P) 4.1 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Partial | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P) 4.1 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Partial |
|
Vulnerability Type: | CWE-399
|
Vulnerability Consequences: | Denial of Service |
References: | Source: MITRE Type: CNA CVE-2006-5779
Source: MISC Type: Exploit http://gleg.net/downloads/VULNDISCO_META_FREE.tar.gz
Source: MISC Type: Exploit http://gleg.net/vulndisco_meta.shtml
Source: CCN Type: SA22750 OpenLDAP BIND Denial of Service Vulnerability
Source: SECUNIA Type: Vendor Advisory 22750
Source: SECUNIA Type: Vendor Advisory 22953
Source: SECUNIA Type: Vendor Advisory 22996
Source: SECUNIA Type: Vendor Advisory 23125
Source: SECUNIA Type: Vendor Advisory 23133
Source: SECUNIA Type: Vendor Advisory 23152
Source: SECUNIA Type: Vendor Advisory 23170
Source: GENTOO Type: UNKNOWN GLSA-200611-25
Source: SREASON Type: UNKNOWN 1831
Source: CCN Type: SECTRACK ID: 1017166 OpenLDAP BIND Request Lets Remote Users Deny Service
Source: SECTRACK Type: Exploit 1017166
Source: CCN Type: GLSA-200611-25 OpenLDAP: Denial of Service vulnerability
Source: CCN Type: GLEG Ltd. Web site VulnDisco Pack for Metasploit
Source: MANDRIVA Type: UNKNOWN MDKSA-2006:208
Source: SUSE Type: UNKNOWN SUSE-SA:2006:072
Source: CONFIRM Type: UNKNOWN http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4740
Source: CCN Type: OpenPKG-SA-2006.033 OpenLDAP
Source: OPENPKG Type: UNKNOWN OpenPKG-SA-2006.033
Source: CCN Type: OSVDB ID: 30226 OpenLDAP SASL authcid Name BIND Request DoS
Source: BUGTRAQ Type: UNKNOWN 20061106 VulnDisco Pack for Metasploit
Source: BID Type: Exploit 20939
Source: CCN Type: BID-20939 OpenLDAP Server Bind Request Denial Of Service Vulnerability
Source: TRUSTIX Type: UNKNOWN 2006-0066
Source: CCN Type: TLSA-2006-44 openldap denial of service attack
Source: CCN Type: USN-384-1 OpenLDAP vulnerability
Source: UBUNTU Type: UNKNOWN USN-384-1
Source: VUPEN Type: Vendor Advisory ADV-2006-4379
Source: XF Type: UNKNOWN openldap-bind-dos(30076)
Source: XF Type: UNKNOWN openldap-bind-dos(30076)
Source: CONFIRM Type: UNKNOWN https://issues.rpath.com/browse/RPL-820
Source: SUSE Type: SUSE-SA:2006:072 openldap2 denial of service problem
|
Vulnerable Configuration: | Configuration 1: cpe:/a:openldap:openldap:1.0:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:1.0.1:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:1.0.2:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:1.0.3:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:1.1:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:1.1.0:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:1.1.1:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:1.1.2:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:1.1.3:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:1.1.4:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:1.2:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:1.2.0:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:1.2.1:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:1.2.2:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:1.2.3:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:1.2.4:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:1.2.5:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:1.2.6:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:1.2.7:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:1.2.8:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:1.2.9:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:1.2.10:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:1.2.11:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:1.2.12:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:1.2.13:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0.0:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0.1:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0.2:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0.3:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0.4:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0.5:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0.6:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0.7:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0.8:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0.9:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0.10:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0.11:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0.12:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0.13:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0.14:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0.15:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0.16:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0.17:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0.18:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0.19:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0.20:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0.21:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0.22:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0.23:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0.24:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0.25:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0.26:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.0.27:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.2:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.3:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.4:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.5:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.6:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.7:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.8:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.9:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.10:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.11:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.12:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.13:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.14:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.15:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.16:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.17:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.18:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.19:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.20:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.21:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.22:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.23:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.24:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.25:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.26:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.27:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.28:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.29:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.1.30:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.2.0:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.2.1:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.2.4:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.2.5:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.2.6:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.2.7:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.2.8:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.2.9:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.2.10:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.2.11:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.2.12:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.2.13:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.2.14:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.2.15:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.2.16:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.2.17:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.2.18:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.2.19:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.2.20:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.2.21:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.2.22:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.2.23:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.2.24:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.2.25:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.2.26:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.2.27:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.3.10:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.3.11:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.3.12:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.3.13:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.3.14:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.3.15:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.3.16:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.3.17:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.3.18:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.3.19:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.3.20:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.3.21:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.3.22:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.3.23:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.3.24:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.3.25:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.3.26:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:2.3.27:*:*:*:*:*:*:*OR cpe:/a:openldap:openldap:*:*:*:*:*:*:*:* (Version <= 2.3.28)
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |