contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation.
References
Link | Resource |
---|---|
http://www.openldap.org/its/index.cgi/Incoming?id=8759 | Issue Tracking Vendor Advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html | Mailing List Third Party Advisory |
https://kc.mcafee.com/corporate/index?page=content&id=SB10365 | Third Party Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2017-12-17 22:29
Updated : 2022-06-13 12:10
NVD link : CVE-2017-17740
Mitre link : CVE-2017-17740
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
oracle
- blockchain_platform
opensuse
- leap
mcafee
- policy_auditor
openldap
- openldap