CVE-2007-5707

OpenLDAP before 2.3.39 allows remote attackers to cause a denial of service (slapd crash) via an LDAP request with a malformed objectClasses attribute. NOTE: this has been reported as a double free, but the reports are inconsistent.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=440632
http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
http://secunia.com/advisories/27424 Patch Vendor Advisory
http://secunia.com/advisories/27587 Vendor Advisory
http://secunia.com/advisories/27596 Vendor Advisory
http://secunia.com/advisories/27683 Vendor Advisory
http://secunia.com/advisories/27756 Vendor Advisory
http://secunia.com/advisories/27868 Vendor Advisory
http://secunia.com/advisories/29461 Vendor Advisory
http://secunia.com/advisories/29682 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200803-28.xml
http://support.apple.com/kb/HT3937
http://www.debian.org/security/2008/dsa-1541
http://www.mandriva.com/security/advisories?name=MDKSA-2007:215
http://www.novell.com/linux/security/advisories/2007_24_sr.html
http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5119
http://www.openldap.org/lists/openldap-announce/200710/msg00001.html Patch
http://www.redhat.com/archives/fedora-package-announce/2007-November/msg00460.html
http://www.redhat.com/support/errata/RHSA-2007-1037.html
http://www.redhat.com/support/errata/RHSA-2007-1038.html
http://www.securityfocus.com/bid/26245
http://www.securitytracker.com/id?1018924
http://www.ubuntu.com/usn/usn-551-1
http://www.vupen.com/english/advisories/2007/3645 Vendor Advisory
http://www.vupen.com/english/advisories/2009/3184 Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10183
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=440632
http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
http://secunia.com/advisories/27424 Patch Vendor Advisory
http://secunia.com/advisories/27587 Vendor Advisory
http://secunia.com/advisories/27596 Vendor Advisory
http://secunia.com/advisories/27683 Vendor Advisory
http://secunia.com/advisories/27756 Vendor Advisory
http://secunia.com/advisories/27868 Vendor Advisory
http://secunia.com/advisories/29461 Vendor Advisory
http://secunia.com/advisories/29682 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200803-28.xml
http://support.apple.com/kb/HT3937
http://www.debian.org/security/2008/dsa-1541
http://www.mandriva.com/security/advisories?name=MDKSA-2007:215
http://www.novell.com/linux/security/advisories/2007_24_sr.html
http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5119
http://www.openldap.org/lists/openldap-announce/200710/msg00001.html Patch
http://www.redhat.com/archives/fedora-package-announce/2007-November/msg00460.html
http://www.redhat.com/support/errata/RHSA-2007-1037.html
http://www.redhat.com/support/errata/RHSA-2007-1038.html
http://www.securityfocus.com/bid/26245
http://www.securitytracker.com/id?1018924
http://www.ubuntu.com/usn/usn-551-1
http://www.vupen.com/english/advisories/2007/3645 Vendor Advisory
http://www.vupen.com/english/advisories/2009/3184 Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10183
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openldap:openldap:1.0:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:1.1:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:1.2:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:1.2.9:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:1.2.10:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:1.2.11:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:1.2.12:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:1.2.13:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.10:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.11:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.11_9:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.11_11:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.11_11s:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.12:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.13:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.14:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.15:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.16:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.17:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.18:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.19:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.20:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.21:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.22:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.23:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.24:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.25:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.26:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.27:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.6:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.7:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.8:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.9:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.10:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.11:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.12:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.13:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.14:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.15:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.16:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.17:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.18:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.19:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.20:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.21:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.22:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.23:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.24:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.25:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.26:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.27:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.28:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.29:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.30:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1_.20:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.7:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.8:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.9:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.10:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.11:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.12:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.13:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.14:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.15:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.16:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.17:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.18:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.19:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.20:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.21:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.22:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.23:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.24:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.25:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.26:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.27:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.28_r2:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.29_rev_1.134:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.3.27_2.20061018:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.3.28_2.20061022:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.3.28_20061022:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.3.28_e1.0.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:38

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=440632 - () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=440632 -
References () http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html - () http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html -
References () http://secunia.com/advisories/27424 - Patch, Vendor Advisory () http://secunia.com/advisories/27424 - Patch, Vendor Advisory
References () http://secunia.com/advisories/27587 - Vendor Advisory () http://secunia.com/advisories/27587 - Vendor Advisory
References () http://secunia.com/advisories/27596 - Vendor Advisory () http://secunia.com/advisories/27596 - Vendor Advisory
References () http://secunia.com/advisories/27683 - Vendor Advisory () http://secunia.com/advisories/27683 - Vendor Advisory
References () http://secunia.com/advisories/27756 - Vendor Advisory () http://secunia.com/advisories/27756 - Vendor Advisory
References () http://secunia.com/advisories/27868 - Vendor Advisory () http://secunia.com/advisories/27868 - Vendor Advisory
References () http://secunia.com/advisories/29461 - Vendor Advisory () http://secunia.com/advisories/29461 - Vendor Advisory
References () http://secunia.com/advisories/29682 - Vendor Advisory () http://secunia.com/advisories/29682 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200803-28.xml - () http://security.gentoo.org/glsa/glsa-200803-28.xml -
References () http://support.apple.com/kb/HT3937 - () http://support.apple.com/kb/HT3937 -
References () http://www.debian.org/security/2008/dsa-1541 - () http://www.debian.org/security/2008/dsa-1541 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2007:215 - () http://www.mandriva.com/security/advisories?name=MDKSA-2007:215 -
References () http://www.novell.com/linux/security/advisories/2007_24_sr.html - () http://www.novell.com/linux/security/advisories/2007_24_sr.html -
References () http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5119 - () http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5119 -
References () http://www.openldap.org/lists/openldap-announce/200710/msg00001.html - Patch () http://www.openldap.org/lists/openldap-announce/200710/msg00001.html - Patch
References () http://www.redhat.com/archives/fedora-package-announce/2007-November/msg00460.html - () http://www.redhat.com/archives/fedora-package-announce/2007-November/msg00460.html -
References () http://www.redhat.com/support/errata/RHSA-2007-1037.html - () http://www.redhat.com/support/errata/RHSA-2007-1037.html -
References () http://www.redhat.com/support/errata/RHSA-2007-1038.html - () http://www.redhat.com/support/errata/RHSA-2007-1038.html -
References () http://www.securityfocus.com/bid/26245 - () http://www.securityfocus.com/bid/26245 -
References () http://www.securitytracker.com/id?1018924 - () http://www.securitytracker.com/id?1018924 -
References () http://www.ubuntu.com/usn/usn-551-1 - () http://www.ubuntu.com/usn/usn-551-1 -
References () http://www.vupen.com/english/advisories/2007/3645 - Vendor Advisory () http://www.vupen.com/english/advisories/2007/3645 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2009/3184 - Vendor Advisory () http://www.vupen.com/english/advisories/2009/3184 - Vendor Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10183 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10183 -

07 Nov 2023, 02:01

Type Values Removed Values Added
Summary OpenLDAP before 2.3.39 allows remote attackers to cause a denial of service (slapd crash) via an LDAP request with a malformed objectClasses attribute. NOTE: this has been reported as a double free, but the reports are inconsistent. OpenLDAP before 2.3.39 allows remote attackers to cause a denial of service (slapd crash) via an LDAP request with a malformed objectClasses attribute. NOTE: this has been reported as a double free, but the reports are inconsistent.

Information

Published : 2007-10-30 19:46

Updated : 2024-11-21 00:38


NVD link : CVE-2007-5707

Mitre link : CVE-2007-5707

CVE.ORG link : CVE-2007-5707


JSON object : View

Products Affected

openldap

  • openldap
CWE
CWE-399

Resource Management Errors