OpenLDAP before 2.3.29 allows remote attackers to cause a denial of service (daemon crash) via LDAP BIND requests with long authcid names, which triggers an assertion failure.
References
Configurations
History
21 Nov 2024, 00:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://gleg.net/downloads/VULNDISCO_META_FREE.tar.gz - Broken Link, Exploit | |
References | () http://gleg.net/vulndisco_meta.shtml - Broken Link, Exploit | |
References | () http://secunia.com/advisories/22750 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/22953 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/22996 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/23125 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/23133 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/23152 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/23170 - Broken Link, Vendor Advisory | |
References | () http://security.gentoo.org/glsa/glsa-200611-25.xml - Third Party Advisory | |
References | () http://securityreason.com/securityalert/1831 - Broken Link | |
References | () http://securitytracker.com/id?1017166 - Broken Link, Exploit, Third Party Advisory, VDB Entry | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:208 - Broken Link | |
References | () http://www.novell.com/linux/security/advisories/2006_72_openldap2.html - Broken Link | |
References | () http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4740 - Exploit, Issue Tracking | |
References | () http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.033-openldap.html - Broken Link | |
References | () http://www.securityfocus.com/archive/1/450728/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/20939 - Broken Link, Exploit, Third Party Advisory, VDB Entry | |
References | () http://www.trustix.org/errata/2006/0066/ - Broken Link | |
References | () http://www.ubuntu.com/usn/usn-384-1 - Third Party Advisory | |
References | () http://www.vupen.com/english/advisories/2006/4379 - Broken Link, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/30076 - Third Party Advisory, VDB Entry | |
References | () https://issues.rpath.com/browse/RPL-820 - Broken Link |
08 Feb 2024, 02:20
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:openldap:openldap:2.0.11:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.3.22:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.1.24:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.0.8:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.2.8:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.1.6:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.0.6:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.0.23:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.2.7:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:1.1.2:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.3.27:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.1.13:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.2.22:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.1.22:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.2.18:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.0.9:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.0.10:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.0.17:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.0.5:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.1.29:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.0.27:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.2.17:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.1.11:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.1.2:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:1.2.9:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.3.24:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.1.4:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.2.15:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.3.21:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.2.14:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.3.25:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:1.2:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.1.12:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.3.12:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:1.2.3:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.0.26:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:1.2.11:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.0.24:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.3.16:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:1.1:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.3.10:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.2.16:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.2.27:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.0.7:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.0:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.1.7:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.3.11:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.0.25:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.2.1:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.3.23:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.2.26:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:1.2.5:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.1.9:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:1.2.13:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.0.3:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.2.13:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:1.0:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:1.2.8:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.1.3:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.3.17:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.1.28:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.3.20:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.3.26:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:1.0.3:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.1.15:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.2.12:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:1.2.4:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.1.10:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.3.18:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:1.1.0:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.3.13:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.1.16:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.0.14:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.1.23:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.1.20:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.3.19:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.0.4:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.0.21:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.2.10:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.2.21:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.2.0:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.2.11:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.3.14:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.2.6:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.0.19:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:1.0.2:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.1.17:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.2.25:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.1.25:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.1.18:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.3.15:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.2.24:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.0.2:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.0.13:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.1.30:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:1.2.10:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.2.4:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.2.5:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:1.2.0:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.0.16:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:1.2.2:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.0.20:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:1.1.1:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.1.14:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.1.21:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:1.2.1:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.2.23:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.0.22:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:1.0.1:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.0.1:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.0.18:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.1.26:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:1.1.3:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.0.15:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:1.1.4:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.0.12:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.1.27:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.2.9:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.2.19:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.2.20:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:1.2.7:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.1.19:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:1.2.12:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.0.0:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:2.1.5:*:*:*:*:*:*:* cpe:2.3:a:openldap:openldap:1.2.6:*:*:*:*:*:*:* |
cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* |
CWE | CWE-617 | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
References | () http://gleg.net/downloads/VULNDISCO_META_FREE.tar.gz - Broken Link, Exploit | |
References | () http://gleg.net/vulndisco_meta.shtml - Broken Link, Exploit | |
References | () http://secunia.com/advisories/22750 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/22953 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/22996 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/23125 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/23133 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/23152 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/23170 - Broken Link, Vendor Advisory | |
References | () http://security.gentoo.org/glsa/glsa-200611-25.xml - Third Party Advisory | |
References | () http://securityreason.com/securityalert/1831 - Broken Link | |
References | () http://securitytracker.com/id?1017166 - Broken Link, Exploit, Third Party Advisory, VDB Entry | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:208 - Broken Link | |
References | () http://www.novell.com/linux/security/advisories/2006_72_openldap2.html - Broken Link | |
References | () http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4740 - Exploit, Issue Tracking | |
References | () http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.033-openldap.html - Broken Link | |
References | () http://www.securityfocus.com/archive/1/450728/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/20939 - Broken Link, Exploit, Third Party Advisory, VDB Entry | |
References | () http://www.trustix.org/errata/2006/0066/ - Broken Link | |
References | () http://www.ubuntu.com/usn/usn-384-1 - Third Party Advisory | |
References | () http://www.vupen.com/english/advisories/2006/4379 - Broken Link, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/30076 - Third Party Advisory, VDB Entry | |
References | () https://issues.rpath.com/browse/RPL-820 - Broken Link | |
First Time |
Canonical ubuntu Linux
Canonical |
Information
Published : 2006-11-07 18:07
Updated : 2024-11-21 00:20
NVD link : CVE-2006-5779
Mitre link : CVE-2006-5779
CVE.ORG link : CVE-2006-5779
JSON object : View
Products Affected
openldap
- openldap
canonical
- ubuntu_linux
CWE
CWE-617
Reachable Assertion