|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for openldap RHSA-2014:0206-01|
|Summary:||The remote host is missing an update for the 'openldap'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'openldap'
package(s) announced via the referenced advisory.
OpenLDAP is an open source suite of Lightweight Directory Access Protocol
(LDAP) applications and development tools. LDAP is a set of protocols used
to access and maintain distributed directory information services over an
IP network. The openldap package contains configuration files, libraries,
and documentation for OpenLDAP.
A denial of service flaw was found in the way the OpenLDAP server daemon
(slapd) performed reference counting when using the rwm (rewrite/remap)
overlay. A remote attacker able to query the OpenLDAP server could use this
flaw to crash the server by immediately unbinding from the server after
sending a search request. (CVE-2013-4449)
Red Hat would like to thank Michael Vishchers from Seven Principles AG for
reporting this issue.
All openldap users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue.
openldap on Red Hat Enterprise Linux (v. 5 server)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2013-4449|
BugTraq ID: 63190
Bugtraq: 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra (Google Search)
Cisco Security Advisory: 20140401 Cisco Unified Communications Manager Denial of Service Vulnerability
Debian Security Information: DSA-3209 (Google Search)
RedHat Security Advisories: RHSA-2014:0126
RedHat Security Advisories: RHSA-2014:0206
|Copyright||Copyright (C) 2014 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.