National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2015-1545 Detail

Description

The deref_parseCtrl function in servers/slapd/overlays/deref.c in OpenLDAP 2.4.13 through 2.4.40 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an empty attribute list in a deref control in a search request.

Source:  MITRE      Last Modified:  02/12/2015

Evaluator Description

CWE-476: NULL Pointer Dereference

Quick Info

CVE Dictionary Entry:
CVE-2015-1545
Original release date:
02/12/2015
Last revised:
09/07/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
5.0 MEDIUM
Vector:
(AV:N/AC:L/Au:N/C:N/I:N/A:P) (legend)
Impact Subscore:
2.9
Exploitability Subscore:
10.0
CVSS Version 2 Metrics:
Access Vector:
Network exploitable
Access Complexity:
Low
Authentication:
Not required to exploit
Impact Type:
Allows disruption of service

Vendor Statements (disclaimer)

Official Statement from openldap.org (02/25/2015)

Note that the deref overlay is not enabled by default, so this vulnerability only affects sites that have explicitly configured their servers to load and enable the overlay. Since this overlay has never been documented, there are no sites outside of the OpenLDAP developer community with a legitimate reason to enable this module.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html External Source APPLE APPLE-SA-2015-04-08-2
http://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html External Source SUSE openSUSE-SU-2015:1325
http://www.debian.org/security/2015/dsa-3209 External Source DEBIAN DSA-3209
http://www.mandriva.com/security/advisories?name=MDVSA-2015:073 External Source MANDRIVA MDVSA-2015:073
http://www.mandriva.com/security/advisories?name=MDVSA-2015:074 External Source MANDRIVA MDVSA-2015:074
http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=c32e74763f77675b9e144126e375977ed6dc562c External Source CONFIRM http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=c32e74763f77675b9e144126e375977ed6dc562c
http://www.openldap.org/its/?findid=8027 Exploit; Vendor Advisory External Source CONFIRM http://www.openldap.org/its/?findid=8027
http://www.openwall.com/lists/oss-security/2015/02/07/3 External Source MLIST [oss-security] 20150207 Re: CVE request: two OpenLDAP DoS issues
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html External Source CONFIRM http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
http://www.securityfocus.com/bid/72519 External Source BID 72519
http://www.securitytracker.com/id/1032399 External Source SECTRACK 1032399
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776988 External Source CONFIRM https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776988
https://exchange.xforce.ibmcloud.com/vulnerabilities/100937 External Source XF openldap-cve20151545-dos(100937)
https://support.apple.com/HT204659 External Source CONFIRM https://support.apple.com/HT204659

Technical Details

Vulnerability Type (View All)

Vulnerable software and versions Switch to CPE 2.2

Configuration 1
OR
cpe:2.3:a:openldap:openldap:2.4.13:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.14:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.15:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.16:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.17:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.18:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.19:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.20:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.21:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.22:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.23:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.24:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.25:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.26:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.27:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.28:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.29:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.30:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.31:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.32:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.33:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.34:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.35:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.36:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.37:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.38:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.39:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.4.40:*:*:*:*:*:*:*

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History 12 change records found - show changes