ID CVE-2007-5707
Summary OpenLDAP before 2.3.39 allows remote attackers to cause a denial of service (slapd crash) via an LDAP request with a malformed objectClasses attribute. NOTE: this has been reported as a double free, but the reports are inconsistent.
References
Vulnerable Configurations
  • cpe:2.3:a:openldap:openldap:1.0
    cpe:2.3:a:openldap:openldap:1.0
  • cpe:2.3:a:openldap:openldap:1.0.1
    cpe:2.3:a:openldap:openldap:1.0.1
  • cpe:2.3:a:openldap:openldap:1.0.2
    cpe:2.3:a:openldap:openldap:1.0.2
  • cpe:2.3:a:openldap:openldap:1.0.3
    cpe:2.3:a:openldap:openldap:1.0.3
  • cpe:2.3:a:openldap:openldap:1.1
    cpe:2.3:a:openldap:openldap:1.1
  • cpe:2.3:a:openldap:openldap:1.1.0
    cpe:2.3:a:openldap:openldap:1.1.0
  • cpe:2.3:a:openldap:openldap:1.1.1
    cpe:2.3:a:openldap:openldap:1.1.1
  • cpe:2.3:a:openldap:openldap:1.1.2
    cpe:2.3:a:openldap:openldap:1.1.2
  • cpe:2.3:a:openldap:openldap:1.1.3
    cpe:2.3:a:openldap:openldap:1.1.3
  • cpe:2.3:a:openldap:openldap:1.1.4
    cpe:2.3:a:openldap:openldap:1.1.4
  • cpe:2.3:a:openldap:openldap:1.2
    cpe:2.3:a:openldap:openldap:1.2
  • cpe:2.3:a:openldap:openldap:1.2.0
    cpe:2.3:a:openldap:openldap:1.2.0
  • cpe:2.3:a:openldap:openldap:1.2.1
    cpe:2.3:a:openldap:openldap:1.2.1
  • cpe:2.3:a:openldap:openldap:1.2.10
    cpe:2.3:a:openldap:openldap:1.2.10
  • cpe:2.3:a:openldap:openldap:1.2.11
    cpe:2.3:a:openldap:openldap:1.2.11
  • cpe:2.3:a:openldap:openldap:1.2.12
    cpe:2.3:a:openldap:openldap:1.2.12
  • cpe:2.3:a:openldap:openldap:1.2.13
    cpe:2.3:a:openldap:openldap:1.2.13
  • cpe:2.3:a:openldap:openldap:1.2.2
    cpe:2.3:a:openldap:openldap:1.2.2
  • cpe:2.3:a:openldap:openldap:1.2.3
    cpe:2.3:a:openldap:openldap:1.2.3
  • cpe:2.3:a:openldap:openldap:1.2.4
    cpe:2.3:a:openldap:openldap:1.2.4
  • cpe:2.3:a:openldap:openldap:1.2.5
    cpe:2.3:a:openldap:openldap:1.2.5
  • cpe:2.3:a:openldap:openldap:1.2.6
    cpe:2.3:a:openldap:openldap:1.2.6
  • cpe:2.3:a:openldap:openldap:1.2.7
    cpe:2.3:a:openldap:openldap:1.2.7
  • cpe:2.3:a:openldap:openldap:1.2.8
    cpe:2.3:a:openldap:openldap:1.2.8
  • cpe:2.3:a:openldap:openldap:1.2.9
    cpe:2.3:a:openldap:openldap:1.2.9
  • cpe:2.3:a:openldap:openldap:2.0
    cpe:2.3:a:openldap:openldap:2.0
  • cpe:2.3:a:openldap:openldap:2.0.0
    cpe:2.3:a:openldap:openldap:2.0.0
  • cpe:2.3:a:openldap:openldap:2.0.1
    cpe:2.3:a:openldap:openldap:2.0.1
  • cpe:2.3:a:openldap:openldap:2.0.10
    cpe:2.3:a:openldap:openldap:2.0.10
  • cpe:2.3:a:openldap:openldap:2.0.11
    cpe:2.3:a:openldap:openldap:2.0.11
  • cpe:2.3:a:openldap:openldap:2.0.11_11
    cpe:2.3:a:openldap:openldap:2.0.11_11
  • cpe:2.3:a:openldap:openldap:2.0.11_11s
    cpe:2.3:a:openldap:openldap:2.0.11_11s
  • cpe:2.3:a:openldap:openldap:2.0.11_9
    cpe:2.3:a:openldap:openldap:2.0.11_9
  • cpe:2.3:a:openldap:openldap:2.0.12
    cpe:2.3:a:openldap:openldap:2.0.12
  • cpe:2.3:a:openldap:openldap:2.0.13
    cpe:2.3:a:openldap:openldap:2.0.13
  • cpe:2.3:a:openldap:openldap:2.0.14
    cpe:2.3:a:openldap:openldap:2.0.14
  • cpe:2.3:a:openldap:openldap:2.0.15
    cpe:2.3:a:openldap:openldap:2.0.15
  • cpe:2.3:a:openldap:openldap:2.0.16
    cpe:2.3:a:openldap:openldap:2.0.16
  • cpe:2.3:a:openldap:openldap:2.0.17
    cpe:2.3:a:openldap:openldap:2.0.17
  • cpe:2.3:a:openldap:openldap:2.0.18
    cpe:2.3:a:openldap:openldap:2.0.18
  • cpe:2.3:a:openldap:openldap:2.0.19
    cpe:2.3:a:openldap:openldap:2.0.19
  • cpe:2.3:a:openldap:openldap:2.0.2
    cpe:2.3:a:openldap:openldap:2.0.2
  • cpe:2.3:a:openldap:openldap:2.0.20
    cpe:2.3:a:openldap:openldap:2.0.20
  • cpe:2.3:a:openldap:openldap:2.0.21
    cpe:2.3:a:openldap:openldap:2.0.21
  • cpe:2.3:a:openldap:openldap:2.0.22
    cpe:2.3:a:openldap:openldap:2.0.22
  • cpe:2.3:a:openldap:openldap:2.0.23
    cpe:2.3:a:openldap:openldap:2.0.23
  • cpe:2.3:a:openldap:openldap:2.0.24
    cpe:2.3:a:openldap:openldap:2.0.24
  • cpe:2.3:a:openldap:openldap:2.0.25
    cpe:2.3:a:openldap:openldap:2.0.25
  • cpe:2.3:a:openldap:openldap:2.0.26
    cpe:2.3:a:openldap:openldap:2.0.26
  • cpe:2.3:a:openldap:openldap:2.0.27
    cpe:2.3:a:openldap:openldap:2.0.27
  • cpe:2.3:a:openldap:openldap:2.0.3
    cpe:2.3:a:openldap:openldap:2.0.3
  • cpe:2.3:a:openldap:openldap:2.0.4
    cpe:2.3:a:openldap:openldap:2.0.4
  • cpe:2.3:a:openldap:openldap:2.0.5
    cpe:2.3:a:openldap:openldap:2.0.5
  • cpe:2.3:a:openldap:openldap:2.0.6
    cpe:2.3:a:openldap:openldap:2.0.6
  • cpe:2.3:a:openldap:openldap:2.0.7
    cpe:2.3:a:openldap:openldap:2.0.7
  • cpe:2.3:a:openldap:openldap:2.0.8
    cpe:2.3:a:openldap:openldap:2.0.8
  • cpe:2.3:a:openldap:openldap:2.0.9
    cpe:2.3:a:openldap:openldap:2.0.9
  • cpe:2.3:a:openldap:openldap:2.1.10
    cpe:2.3:a:openldap:openldap:2.1.10
  • cpe:2.3:a:openldap:openldap:2.1.11
    cpe:2.3:a:openldap:openldap:2.1.11
  • cpe:2.3:a:openldap:openldap:2.1.12
    cpe:2.3:a:openldap:openldap:2.1.12
  • cpe:2.3:a:openldap:openldap:2.1.13
    cpe:2.3:a:openldap:openldap:2.1.13
  • cpe:2.3:a:openldap:openldap:2.1.14
    cpe:2.3:a:openldap:openldap:2.1.14
  • cpe:2.3:a:openldap:openldap:2.1.15
    cpe:2.3:a:openldap:openldap:2.1.15
  • cpe:2.3:a:openldap:openldap:2.1.16
    cpe:2.3:a:openldap:openldap:2.1.16
  • cpe:2.3:a:openldap:openldap:2.1.17
    cpe:2.3:a:openldap:openldap:2.1.17
  • cpe:2.3:a:openldap:openldap:2.1.18
    cpe:2.3:a:openldap:openldap:2.1.18
  • cpe:2.3:a:openldap:openldap:2.1.19
    cpe:2.3:a:openldap:openldap:2.1.19
  • cpe:2.3:a:openldap:openldap:2.1.2
    cpe:2.3:a:openldap:openldap:2.1.2
  • cpe:2.3:a:openldap:openldap:2.1.20
    cpe:2.3:a:openldap:openldap:2.1.20
  • cpe:2.3:a:openldap:openldap:2.1.21
    cpe:2.3:a:openldap:openldap:2.1.21
  • cpe:2.3:a:openldap:openldap:2.1.22
    cpe:2.3:a:openldap:openldap:2.1.22
  • cpe:2.3:a:openldap:openldap:2.1.23
    cpe:2.3:a:openldap:openldap:2.1.23
  • cpe:2.3:a:openldap:openldap:2.1.24
    cpe:2.3:a:openldap:openldap:2.1.24
  • cpe:2.3:a:openldap:openldap:2.1.25
    cpe:2.3:a:openldap:openldap:2.1.25
  • cpe:2.3:a:openldap:openldap:2.1.26
    cpe:2.3:a:openldap:openldap:2.1.26
  • cpe:2.3:a:openldap:openldap:2.1.27
    cpe:2.3:a:openldap:openldap:2.1.27
  • cpe:2.3:a:openldap:openldap:2.1.28
    cpe:2.3:a:openldap:openldap:2.1.28
  • cpe:2.3:a:openldap:openldap:2.1.29
    cpe:2.3:a:openldap:openldap:2.1.29
  • cpe:2.3:a:openldap:openldap:2.1.3
    cpe:2.3:a:openldap:openldap:2.1.3
  • cpe:2.3:a:openldap:openldap:2.1.30
    cpe:2.3:a:openldap:openldap:2.1.30
  • cpe:2.3:a:openldap:openldap:2.1.4
    cpe:2.3:a:openldap:openldap:2.1.4
  • cpe:2.3:a:openldap:openldap:2.1.5
    cpe:2.3:a:openldap:openldap:2.1.5
  • cpe:2.3:a:openldap:openldap:2.1.6
    cpe:2.3:a:openldap:openldap:2.1.6
  • cpe:2.3:a:openldap:openldap:2.1.7
    cpe:2.3:a:openldap:openldap:2.1.7
  • cpe:2.3:a:openldap:openldap:2.1.8
    cpe:2.3:a:openldap:openldap:2.1.8
  • cpe:2.3:a:openldap:openldap:2.1.9
    cpe:2.3:a:openldap:openldap:2.1.9
  • cpe:2.3:a:openldap:openldap:2.1_.20
    cpe:2.3:a:openldap:openldap:2.1_.20
  • cpe:2.3:a:openldap:openldap:2.2.0
    cpe:2.3:a:openldap:openldap:2.2.0
  • cpe:2.3:a:openldap:openldap:2.2.1
    cpe:2.3:a:openldap:openldap:2.2.1
  • cpe:2.3:a:openldap:openldap:2.2.10
    cpe:2.3:a:openldap:openldap:2.2.10
  • cpe:2.3:a:openldap:openldap:2.2.11
    cpe:2.3:a:openldap:openldap:2.2.11
  • cpe:2.3:a:openldap:openldap:2.2.12
    cpe:2.3:a:openldap:openldap:2.2.12
  • cpe:2.3:a:openldap:openldap:2.2.13
    cpe:2.3:a:openldap:openldap:2.2.13
  • cpe:2.3:a:openldap:openldap:2.2.14
    cpe:2.3:a:openldap:openldap:2.2.14
  • cpe:2.3:a:openldap:openldap:2.2.15
    cpe:2.3:a:openldap:openldap:2.2.15
  • cpe:2.3:a:openldap:openldap:2.2.16
    cpe:2.3:a:openldap:openldap:2.2.16
  • cpe:2.3:a:openldap:openldap:2.2.17
    cpe:2.3:a:openldap:openldap:2.2.17
  • cpe:2.3:a:openldap:openldap:2.2.18
    cpe:2.3:a:openldap:openldap:2.2.18
  • cpe:2.3:a:openldap:openldap:2.2.19
    cpe:2.3:a:openldap:openldap:2.2.19
  • cpe:2.3:a:openldap:openldap:2.2.20
    cpe:2.3:a:openldap:openldap:2.2.20
  • cpe:2.3:a:openldap:openldap:2.2.21
    cpe:2.3:a:openldap:openldap:2.2.21
  • cpe:2.3:a:openldap:openldap:2.2.22
    cpe:2.3:a:openldap:openldap:2.2.22
  • cpe:2.3:a:openldap:openldap:2.2.23
    cpe:2.3:a:openldap:openldap:2.2.23
  • cpe:2.3:a:openldap:openldap:2.2.24
    cpe:2.3:a:openldap:openldap:2.2.24
  • cpe:2.3:a:openldap:openldap:2.2.25
    cpe:2.3:a:openldap:openldap:2.2.25
  • cpe:2.3:a:openldap:openldap:2.2.26
    cpe:2.3:a:openldap:openldap:2.2.26
  • cpe:2.3:a:openldap:openldap:2.2.27
    cpe:2.3:a:openldap:openldap:2.2.27
  • cpe:2.3:a:openldap:openldap:2.2.28_r2
    cpe:2.3:a:openldap:openldap:2.2.28_r2
  • cpe:2.3:a:openldap:openldap:2.2.29_rev_1.134
    cpe:2.3:a:openldap:openldap:2.2.29_rev_1.134
  • cpe:2.3:a:openldap:openldap:2.2.4
    cpe:2.3:a:openldap:openldap:2.2.4
  • cpe:2.3:a:openldap:openldap:2.2.5
    cpe:2.3:a:openldap:openldap:2.2.5
  • cpe:2.3:a:openldap:openldap:2.2.6
    cpe:2.3:a:openldap:openldap:2.2.6
  • cpe:2.3:a:openldap:openldap:2.2.7
    cpe:2.3:a:openldap:openldap:2.2.7
  • cpe:2.3:a:openldap:openldap:2.2.8
    cpe:2.3:a:openldap:openldap:2.2.8
  • cpe:2.3:a:openldap:openldap:2.2.9
    cpe:2.3:a:openldap:openldap:2.2.9
  • cpe:2.3:a:openldap:openldap:2.3.27_2.20061018
    cpe:2.3:a:openldap:openldap:2.3.27_2.20061018
  • cpe:2.3:a:openldap:openldap:2.3.28_2.20061022
    cpe:2.3:a:openldap:openldap:2.3.28_2.20061022
  • cpe:2.3:a:openldap:openldap:2.3.28_20061022
    cpe:2.3:a:openldap:openldap:2.3.28_20061022
  • cpe:2.3:a:openldap:openldap:2.3.28_e1.0.0
    cpe:2.3:a:openldap:openldap:2.3.28_e1.0.0
CVSS
Base: 7.1 (as of 31-10-2007 - 06:21)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
nessus via4
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-1541.NASL
    description Several remote vulnerabilities have been discovered in OpenLDAP, a free implementation of the Lightweight Directory Access Protocol. The Common Vulnerabilities and Exposures project identifies the following problems : - CVE-2007-5707 Thomas Sesselmann discovered that slapd could be crashed by a malformed modify requests. - CVE-2007-5708 Toby Blade discovered that incorrect memory handling in slapo-pcache could lead to denial of service through crafted search requests. - CVE-2007-6698 It was discovered that a programming error in the interface to the BDB storage backend could lead to denial of service through crafted modify requests. - CVE-2008-0658 It was discovered that a programming error in the interface to the BDB storage backend could lead to denial of service through crafted modrdn requests.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 31811
    published 2008-04-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=31811
    title Debian DSA-1541-1 : openldap2.3 - several vulnerabilities
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20071115_OPENLDAP_ON_SL4_X.NASL
    description A flaw was found in the way OpenLDAP's slapd daemon handled malformed objectClasses LDAP attributes. An authenticated local or remote attacker could create an LDAP request which could cause a denial of service by crashing slapd. (CVE-2007-5707)
    last seen 2019-02-21
    modified 2019-01-07
    plugin id 60305
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=60305
    title Scientific Linux Security Update : openldap on SL4.x i386/x86_64
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-551-1.NASL
    description Thomas Sesselmann discovered that the OpenLDAP slapd server did not properly handle certain modify requests. A remote attacker could send malicious modify requests to the server and cause a denial of service. (CVE-2007-5707) Toby Blake discovered that slapd did not properly terminate an array while running as a proxy-caching server. A remote attacker may be able to send crafted search requests to the server and cause a denial of service. This issue only affects Ubuntu 7.04 and 7.10. (CVE-2007-5708). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 29215
    published 2007-12-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=29215
    title Ubuntu 6.06 LTS / 6.10 / 7.04 / 7.10 : openldap vulnerabilities (USN-551-1)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20071108_OPENLDAP_ON_SL5_X.NASL
    description A flaw was found in the way OpenLDAP's slapd daemon handled malformed objectClasses LDAP attributes. A local or remote attacker could create an LDAP request which could cause a denial of service by crashing slapd. (CVE-2007-5707) In addition, the following feature was added : - OpenLDAP client tools now have new option to configure their bind timeout
    last seen 2019-02-21
    modified 2019-01-07
    plugin id 60293
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=60293
    title Scientific Linux Security Update : openldap on SL5.x i386/x86_64
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-200803-28.NASL
    description The remote host is affected by the vulnerability described in GLSA-200803-28 (OpenLDAP: Denial of Service vulnerabilities) The following errors have been discovered in OpenLDAP: Tony Blake discovered an error which exists within the normalisation of 'objectClasses' (CVE-2007-5707). Thomas Sesselmann reported that, when running as a proxy-caching server the 'add_filter_attrs()' function in servers/slapd/overlay/pcache.c does not correctly NULL terminate 'new_attrs' (CVE-2007-5708). A double-free bug exists in attrs_free() in the file servers/slapd/back-bdb/modrdn.c, which was discovered by Jonathan Clarke (CVE-2008-0658). Impact : A remote attacker can cause a Denial of Serivce by sending a malformed 'objectClasses' attribute, and via unknown vectors that prevent the 'new_attrs' array from being NULL terminated, and via a modrdn operation with a NOOP (LDAP_X_NO_OPERATION) control. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-08-10
    plugin id 31634
    published 2008-03-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=31634
    title GLSA-200803-28 : OpenLDAP: Denial of Service vulnerabilities
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2007-1038.NASL
    description Updated openldap packages that fix a security flaw are now available for Red Hat Enterprise Linux 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. OpenLDAP is an open source suite of LDAP (Lightweight Directory Access Protocol) applications and development tools. A flaw was found in the way OpenLDAP's slapd daemon handled malformed objectClasses LDAP attributes. An authenticated local or remote attacker could create an LDAP request which could cause a denial of service by crashing slapd. (CVE-2007-5707) In addition, the following feature was added: * OpenLDAP client tools now have new option to configure their bind timeout. All users are advised to upgrade to these updated openldap packages, which contain a backported patch to correct this issue and provide this security enhancement.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 67060
    published 2013-06-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=67060
    title CentOS 4 : openldap (CESA-2007:1038)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRAKE_MDKSA-2007-215.NASL
    description A flaw in the way OpenLDAP's slapd daemon handled malformed objectClasses LDAP attributes was discovered. A local or remote attacker could create an LDAP request that could cause a denial of service by crashing slapd. Updated packages have been patched to prevent this issue.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 27851
    published 2007-11-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=27851
    title Mandrake Linux Security Advisory : openldap (MDKSA-2007:215)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2007-1038.NASL
    description Updated openldap packages that fix a security flaw are now available for Red Hat Enterprise Linux 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. OpenLDAP is an open source suite of LDAP (Lightweight Directory Access Protocol) applications and development tools. A flaw was found in the way OpenLDAP's slapd daemon handled malformed objectClasses LDAP attributes. An authenticated local or remote attacker could create an LDAP request which could cause a denial of service by crashing slapd. (CVE-2007-5707) In addition, the following feature was added: * OpenLDAP client tools now have new option to configure their bind timeout. All users are advised to upgrade to these updated openldap packages, which contain a backported patch to correct this issue and provide this security enhancement.
    last seen 2019-02-21
    modified 2018-11-16
    plugin id 28247
    published 2007-11-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=28247
    title RHEL 4 : openldap (RHSA-2007:1038)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2007-741.NASL
    description - Fri Nov 2 2007 Jan Safranek 2.3.30-3.fc6 - add ldconfig to devel post/postun (bz#240253) - do not create script in /tmp on startup (bz#188298) - start slupd for each replicated database (bz#210155) - fix security issues #359851 and #359861 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-21
    plugin id 28232
    published 2007-11-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=28232
    title Fedora Core 6 : openldap-2.3.30-3.fc6 (2007-741)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_DB449245870D11DCA3EC001921AB2FA4.NASL
    description BugTraq reports : OpenLDAP is prone to multiple remote denial-of-service vulnerabilities because of an incorrect NULL-termination issue and a double-free issue.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 27601
    published 2007-11-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=27601
    title FreeBSD : openldap -- multiple remote denial of service vulnerabilities (db449245-870d-11dc-a3ec-001921ab2fa4)
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_SECUPD2009-006.NASL
    description The remote host is running a version of Mac OS X 10.5 that does not have Security Update 2009-006 applied. This security update contains fixes for the following products : - AFP Client - Adaptive Firewall - Apache - Apache Portable Runtime - ATS - Certificate Assistant - CoreGraphics - CUPS - Dictionary - DirectoryService - Disk Images - Event Monitor - fetchmail - FTP Server - Help Viewer - International Components for Unicode - IOKit - IPSec - libsecurity - libxml - OpenLDAP - OpenSSH - PHP - QuickDraw Manager - QuickLook - FreeRADIUS - Screen Sharing - Spotlight - Subversion
    last seen 2019-02-21
    modified 2018-07-16
    plugin id 42433
    published 2009-11-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=42433
    title Mac OS X Multiple Vulnerabilities (Security Update 2009-006)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2007-2796.NASL
    description - Fri Nov 2 2007 Jan Safranek 2.3.39-1.fc8 - new upstream version, fixing few security flaws (#362991) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-21
    plugin id 28153
    published 2007-11-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=28153
    title Fedora 8 : openldap-2.3.39-1.fc8 (2007-2796)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_OPENLDAP2-4679.NASL
    description This update fixes multiple flaws that could cause slapd to crash. (CVE-2007-5707 / CVE-2007-5708)
    last seen 2018-09-01
    modified 2012-05-17
    plugin id 29536
    published 2007-12-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=29536
    title SuSE 10 Security Update : openldap2 (ZYPP Patch Number 4679)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_OPENLDAP2-4677.NASL
    description This update fixes multiple flaws that could cause slapd to crash (CVE-2007-5707, CVE-2007-5708).
    last seen 2019-02-21
    modified 2014-06-13
    plugin id 28327
    published 2007-11-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=28327
    title openSUSE 10 Security Update : openldap2 (openldap2-4677)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2007-3124.NASL
    description - Fri Nov 2 2007 Jan Safranek 2.3.34-4.fc7 - fix various security flaws (#360081) - Fri Jul 13 2007 Jan Safranek 2.3.34-3.fc7 - Fix initscript return codes (#242667) - Provide overlays including smbk5pwd (as modules; #246036, #245896, #220895) - Add available modules to config file - do not create script in /tmp on startup (bz#188298) - add compat-slapcat to openldap-compat (bz#179378) - do not import ddp services with migrate_services.pl (bz#201183) - sort the hosts by address, preventing duplicities in migrate*nis*.pl (bz#201540) - start slupd for each replicated database (bz#210155) - add ldconfig to devel post/postun (bz#240253) - include misc.schema in default slapd.conf (bz#147805) - Mon Apr 23 2007 Jan Safranek 2.3.34-2.fc7 - slapadd during package update is now quiet (bz#224581) - use _localstatedir instead of var/ during build (bz#220970) - bind-libbind-devel removed from BuildRequires (bz#216851) - slaptest is now quiet during service ldap start, if there is no error/warning (bz#143697) - libldap_r.so now links with pthread (bz#198226) - do not strip binaries to produce correct .debuginfo packages (bz#152516) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-21
    plugin id 28305
    published 2007-11-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=28305
    title Fedora 7 : openldap-2.3.34-4.fc7 (2007-3124)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2007-1037.NASL
    description Updated openldap packages that fix a security flaw are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. OpenLDAP is an open source suite of LDAP (Lightweight Directory Access Protocol) applications and development tools. A flaw was found in the way OpenLDAP's slapd daemon handled malformed objectClasses LDAP attributes. A local or remote attacker could create an LDAP request which could cause a denial of service by crashing slapd. (CVE-2007-5707) In addition, the following feature was added: * OpenLDAP client tools now have new option to configure their bind timeout. All users are advised to upgrade to these updated openldap packages, which contain a backported patch to correct this issue and provide this security enhancement.
    last seen 2019-02-21
    modified 2018-11-16
    plugin id 27853
    published 2007-11-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=27853
    title RHEL 5 : openldap (RHSA-2007:1037)
oval via4
accepted 2013-04-29T04:02:56.885-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
  • comment The operating system installed on the system is Red Hat Enterprise Linux 5
    oval oval:org.mitre.oval:def:11414
  • comment The operating system installed on the system is CentOS Linux 5.x
    oval oval:org.mitre.oval:def:15802
  • comment Oracle Linux 5.x
    oval oval:org.mitre.oval:def:15459
description OpenLDAP before 2.3.39 allows remote attackers to cause a denial of service (slapd crash) via an LDAP request with a malformed objectClasses attribute. NOTE: this has been reported as a double free, but the reports are inconsistent.
family unix
id oval:org.mitre.oval:def:10183
status accepted
submitted 2010-07-09T03:56:16-04:00
title OpenLDAP before 2.3.39 allows remote attackers to cause a denial of service (slapd crash) via an LDAP request with a malformed objectClasses attribute. NOTE: this has been reported as a double free, but the reports are inconsistent.
version 24
redhat via4
advisories
  • bugzilla
    id 359851
    title CVE-2007-5707 openldap slapd DoS via objectClasses attribute
    oval
    AND
    • comment Red Hat Enterprise Linux 5 is installed
      oval oval:com.redhat.rhsa:tst:20070055001
    • OR
      • AND
        • comment compat-openldap is earlier than 0:2.3.27_2.2.29-8.el5_1.1
          oval oval:com.redhat.rhsa:tst:20071037010
        • comment compat-openldap is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20071037011
      • AND
        • comment openldap is earlier than 0:2.3.27-8.el5_1.1
          oval oval:com.redhat.rhsa:tst:20071037002
        • comment openldap is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20071037003
      • AND
        • comment openldap-clients is earlier than 0:2.3.27-8.el5_1.1
          oval oval:com.redhat.rhsa:tst:20071037004
        • comment openldap-clients is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20071037005
      • AND
        • comment openldap-devel is earlier than 0:2.3.27-8.el5_1.1
          oval oval:com.redhat.rhsa:tst:20071037008
        • comment openldap-devel is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20071037009
      • AND
        • comment openldap-servers is earlier than 0:2.3.27-8.el5_1.1
          oval oval:com.redhat.rhsa:tst:20071037006
        • comment openldap-servers is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20071037007
      • AND
        • comment openldap-servers-sql is earlier than 0:2.3.27-8.el5_1.1
          oval oval:com.redhat.rhsa:tst:20071037012
        • comment openldap-servers-sql is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20071037013
    rhsa
    id RHSA-2007:1037
    released 2007-11-08
    severity Important
    title RHSA-2007:1037: openldap security and enhancement update (Important)
  • bugzilla
    id 359851
    title CVE-2007-5707 openldap slapd DoS via objectClasses attribute
    oval
    AND
    • comment Red Hat Enterprise Linux 4 is installed
      oval oval:com.redhat.rhsa:tst:20060016001
    • OR
      • AND
        • comment compat-openldap is earlier than 0:2.1.30-8.el4_6.1
          oval oval:com.redhat.rhsa:tst:20071038010
        • comment compat-openldap is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20070310013
      • AND
        • comment openldap is earlier than 0:2.2.13-8.el4_6.1
          oval oval:com.redhat.rhsa:tst:20071038002
        • comment openldap is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20070310003
      • AND
        • comment openldap-clients is earlier than 0:2.2.13-8.el4_6.1
          oval oval:com.redhat.rhsa:tst:20071038006
        • comment openldap-clients is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20070310007
      • AND
        • comment openldap-devel is earlier than 0:2.2.13-8.el4_6.1
          oval oval:com.redhat.rhsa:tst:20071038012
        • comment openldap-devel is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20070310009
      • AND
        • comment openldap-servers is earlier than 0:2.2.13-8.el4_6.1
          oval oval:com.redhat.rhsa:tst:20071038004
        • comment openldap-servers is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20070310005
      • AND
        • comment openldap-servers-sql is earlier than 0:2.2.13-8.el4_6.1
          oval oval:com.redhat.rhsa:tst:20071038008
        • comment openldap-servers-sql is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20070310011
    rhsa
    id RHSA-2007:1038
    released 2007-11-15
    severity Moderate
    title RHSA-2007:1038: openldap security and enhancement update (Moderate)
rpms
  • compat-openldap-0:2.3.27_2.2.29-8.el5_1.1
  • openldap-0:2.3.27-8.el5_1.1
  • openldap-clients-0:2.3.27-8.el5_1.1
  • openldap-devel-0:2.3.27-8.el5_1.1
  • openldap-servers-0:2.3.27-8.el5_1.1
  • openldap-servers-sql-0:2.3.27-8.el5_1.1
  • compat-openldap-0:2.1.30-8.el4_6.1
  • openldap-0:2.2.13-8.el4_6.1
  • openldap-clients-0:2.2.13-8.el4_6.1
  • openldap-devel-0:2.2.13-8.el4_6.1
  • openldap-servers-0:2.2.13-8.el4_6.1
  • openldap-servers-sql-0:2.2.13-8.el4_6.1
refmap via4
apple APPLE-SA-2009-11-09-1
bid 26245
confirm
debian DSA-1541
fedora FEDORA-2007-741
gentoo GLSA-200803-28
mandriva MDKSA-2007:215
misc http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5119
mlist [openldap-announce] 20071026 OpenLDAP 2.3.39 available
sectrack 1018924
secunia
  • 27424
  • 27587
  • 27596
  • 27683
  • 27756
  • 27868
  • 29461
  • 29682
suse SUSE-SR:2007:024
ubuntu USN-551-1
vupen
  • ADV-2007-3645
  • ADV-2009-3184
Last major update 07-03-2011 - 00:00
Published 30-10-2007 - 15:46
Last modified 28-09-2017 - 21:29
Back to Top