CVE-2013-4449

Published: 05 February 2014

The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.

Priority

Low

Status

Package Release Status
openldap
Launchpad, Ubuntu, Debian
Upstream
Released (2.4.39-1.1)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (2.4.31-1+nmu2ubuntu8.1)
Patches:
Upstream: http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=924389d9dd9dbb6ffe5db6c0fc65ecfe6814a1af