fkie_cve-2008-2952
Vulnerability from fkie_nvd
Published
2008-07-01 21:41
Modified
2024-11-21 00:48
Severity ?
Summary
liblber/io.c in OpenLDAP 2.2.4 to 2.4.10 allows remote attackers to cause a denial of service (program termination) via crafted ASN.1 BER datagrams that trigger an assertion error.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openldap:openldap:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "0F611094-500A-4306-8C15-4878135FA45D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "32096DE5-3F2C-4FF7-BDC6-E316DFDC97A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FE197F27-CB34-4B0E-A30A-C9C87295AAD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "10A4256F-EC89-425F-86FD-B0DE243EBF2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "4A34127E-507D-4F72-9F93-B23F91DB0F53", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "B7A2D5D9-3E7E-4420-A338-B05A8C077229", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D9090B1B-0724-4526-A40D-47044401B6EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "A5E5AC6E-F43B-404D-BA46-2F4412456ACB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "61AE77E5-6595-45A4-A233-C36B97F551B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "80224FC0-7DF5-4815-9D3D-63AC462119FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "F821D76D-1592-478B-AE7B-D16B22837C74", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "67146520-86CF-4EF6-88AC-22E2D167D686", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "2E8C5E2D-52FD-448B-9423-9F51349BEE4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "FCC99DDD-EF08-45B7-8369-1D52A03D6E58", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "C79D5E35-1F96-4AF5-B89A-A8FCD33D1FDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "B93B4C9A-5C0E-4226-9975-E26330A287A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "0F305125-0477-4C8F-9C94-39EB623E1A35", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "BF72A8C3-6DB5-494A-843F-D3CF57AAFDAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "45104882-4F43-4437-8B2E-2F6E97952C22", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.17:*:*:*:*:*:*:*", "matchCriteriaId": "2C2BDB6E-B620-4707-A2C4-0AC3E6536B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.18:*:*:*:*:*:*:*", "matchCriteriaId": "BC84EA72-7B34-454D-B46D-616596AF41B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.19:*:*:*:*:*:*:*", "matchCriteriaId": "4EE3F254-C565-4650-B875-116FD2C29867", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.20:*:*:*:*:*:*:*", "matchCriteriaId": "49B31BEE-944F-40FA-A173-EF55C2232834", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.21:*:*:*:*:*:*:*", "matchCriteriaId": "003A1BF0-1C40-4A5B-A724-25692199D2C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.22:*:*:*:*:*:*:*", "matchCriteriaId": "9D0298B8-44F5-4375-BBB4-107B1A9D1E17", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.23:*:*:*:*:*:*:*", "matchCriteriaId": "E94E748F-3367-4432-AA85-61767541A377", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.24:*:*:*:*:*:*:*", "matchCriteriaId": "E628F5CE-4D21-43D4-8789-99B32FA28A0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.25:*:*:*:*:*:*:*", "matchCriteriaId": "A4ECDC15-67A3-4432-B141-8EC38C440D6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.26:*:*:*:*:*:*:*", "matchCriteriaId": "BA382EA1-9ED6-4E10-89E7-3DD3A1FE7BBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.27:*:*:*:*:*:*:*", "matchCriteriaId": "6DCE01E9-3D72-433F-A600-B7359C1197FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.28:*:*:*:*:*:*:*", "matchCriteriaId": "75371593-00F5-4F49-B0EC-7835CB1DB97F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.29:*:*:*:*:*:*:*", "matchCriteriaId": "F45E2CED-46CA-4F85-AA38-DCA5141CCFFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.30:*:*:*:*:*:*:*", "matchCriteriaId": "9A1CDD24-F8E3-4C39-BD39-36ADEC814C41", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.31:*:*:*:*:*:*:*", "matchCriteriaId": "64E00372-FD22-45E5-8815-9B0826BE7857", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.32:*:*:*:*:*:*:*", "matchCriteriaId": "4C6B5E35-7109-4FE0-8E34-61C5CA0C5D05", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.33:*:*:*:*:*:*:*", "matchCriteriaId": "5C41A0F2-DBB7-48B6-AF89-7963CED8D196", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.34:*:*:*:*:*:*:*", "matchCriteriaId": "7B0A12F9-7DEA-4E3F-A3A8-3C9E782AC4BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.35:*:*:*:*:*:*:*", "matchCriteriaId": "06223A03-1598-4D0F-B0F6-576AA3CB1E96", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.36:*:*:*:*:*:*:*", "matchCriteriaId": "87155B64-0AE1-4418-8866-84CEA879665B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.37:*:*:*:*:*:*:*", "matchCriteriaId": "A563D3EA-7DE0-4DE7-AD64-8724B6E72A6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.38:*:*:*:*:*:*:*", "matchCriteriaId": "7AF66FA9-EE80-48DD-B10E-8D047CF4BC22", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.39:*:*:*:*:*:*:*", "matchCriteriaId": "1F11D98D-F23D-45B4-9733-B3C0C781ADCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.40:*:*:*:*:*:*:*", "matchCriteriaId": "2EFE64A8-3B40-44C9-983F-8F3BDC9879E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.41:*:*:*:*:*:*:*", "matchCriteriaId": "C51880E8-AA9E-43AD-BDC3-3DA530823AAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.42:*:*:*:*:*:*:*", "matchCriteriaId": "D58AC865-207C-4612-B112-AE430BB76213", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.3.43:*:*:*:*:*:*:*", "matchCriteriaId": "EF350C0B-E6BF-4626-BA1D-DED83358D86A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openldap:openldap:2.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "473AEC48-FBBF-4BEB-8728-1FA80DD94807", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "liblber/io.c in OpenLDAP 2.2.4 to 2.4.10 allows remote attackers to cause a denial of service (program termination) via crafted ASN.1 BER datagrams that trigger an assertion error." }, { "lang": "es", "value": "El archivo liblber/io.c en OpenLDAP versiones 2.2.4 hasta 2.4.10, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (finalizaci\u00f3n del programa) por medio de datagramas ASN.1 BER dise\u00f1ados que desencadenan un error de aserci\u00f3n." } ], "id": "CVE-2008-2952", "lastModified": "2024-11-21T00:48:05.637", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-07-01T21:41:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30853" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30917" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30996" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31326" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31364" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31436" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32254" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32316" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200808-09.xml" }, { "source": "cve@mitre.org", "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0249" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2008/dsa-1650" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:144" }, { "source": "cve@mitre.org", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5580" }, { "source": "cve@mitre.org", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5580%3Bselectid=5580" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2008/07/01/2" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2008/07/13/2" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2008-0583.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/495320/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/30013" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1020405" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/usn-634-1" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/1978/references" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/2268" }, { "source": "cve@mitre.org", "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-052/" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43515" }, { "source": "cve@mitre.org", "url": "https://issues.rpath.com/browse/RPL-2645" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10662" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00109.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00129.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30853" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30996" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31326" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31364" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31436" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32254" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200808-09.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0249" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2008/dsa-1650" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:144" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5580" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5580%3Bselectid=5580" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2008/07/01/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2008/07/13/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0583.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/495320/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/30013" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1020405" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-634-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/1978/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/2268" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-052/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43515" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.rpath.com/browse/RPL-2645" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10662" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00109.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00129.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.