Vulnerabilities > Openldap > Openldap > 2.0.19
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2007-10-30 | CVE-2007-5708 | Resource Management Errors vulnerability in Openldap slapo-pcache (overlays/pcache.c) in slapd in OpenLDAP before 2.3.39, when running as a proxy-caching server, allocates memory using a malloc variant instead of calloc, which prevents an array from being initialized properly and might allow attackers to cause a denial of service (segmentation fault) via unknown vectors that prevent the array from being null terminated. | 7.1 |
2006-12-13 | CVE-2006-6493 | Remote Security vulnerability in OpenLDAP Buffer overflow in the krbv4_ldap_auth function in servers/slapd/kerberos.c in OpenLDAP 2.4.3 and earlier, when OpenLDAP is compiled with the --enable-kbind (Kerberos KBIND) option, allows remote attackers to execute arbitrary code via an LDAP bind request using the LDAP_AUTH_KRBV41 authentication method and long credential data. | 5.1 |
2005-12-21 | CVE-2005-4442 | Packages Insecure RUNPATH vulnerability in Gentoo Linux Untrusted search path vulnerability in OpenLDAP before 2.2.28-r3 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH. | 7.2 |
2004-12-31 | CVE-2004-1880 | Denial-Of-Service vulnerability in OpenLDAP Memory leak in the back-bdb backend for OpenLDAP 2.1.12 and earlier allows remote attackers to cause a denial of service (memory consumption). | 5.0 |
2004-09-07 | CVE-2004-0823 | OpenLDAP 1.0 through 2.1.19, as used in Apple Mac OS 10.3.4 and 10.3.5 and possibly other operating systems, may allow certain authentication schemes to use hashed (crypt) passwords in the userPassword attribute as if they were plaintext passwords, which allows remote attackers to re-use hashed passwords without decrypting them. | 7.5 |