Vulnerabilities > Openldap

DATE CVE VULNERABILITY TITLE RISK
2006-06-01 CVE-2006-2754 Remote Security vulnerability in OpenLDAP
Stack-based buffer overflow in st.c in slurpd for OpenLDAP before 2.3.22 might allow attackers to execute arbitrary code via a long hostname.
network
low complexity
openldap
5.0
2005-12-21 CVE-2005-4442 Packages Insecure RUNPATH vulnerability in Gentoo Linux
Untrusted search path vulnerability in OpenLDAP before 2.2.28-r3 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
local
low complexity
openldap
7.2
2004-12-31 CVE-2004-1880 Denial-Of-Service vulnerability in OpenLDAP
Memory leak in the back-bdb backend for OpenLDAP 2.1.12 and earlier allows remote attackers to cause a denial of service (memory consumption).
network
low complexity
openldap
5.0
2004-09-07 CVE-2004-0823 OpenLDAP 1.0 through 2.1.19, as used in Apple Mac OS 10.3.4 and 10.3.5 and possibly other operating systems, may allow certain authentication schemes to use hashed (crypt) passwords in the userPassword attribute as if they were plaintext passwords, which allows remote attackers to re-use hashed passwords without decrypting them.
network
low complexity
openldap apple
7.5
2003-02-19 CVE-2002-1508 Local Security vulnerability in Openldap 2.0
slapd in OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allows local users to overwrite arbitrary files via a race condition during the creation of a log file for rejected replication requests.
local
high complexity
openldap
1.2
2003-01-02 CVE-2002-1379 Unspecified vulnerability in Openldap 2.0
OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allows remote or local attackers to execute arbitrary code when libldap reads the .ldaprc file within applications that are running with extra privileges.
network
low complexity
openldap
7.5
2003-01-02 CVE-2002-1378 Buffer Overflow vulnerability in Openldap 2.0
Multiple buffer overflows in OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allow remote attackers to execute arbitrary code via (1) long -t or -r parameters to slurpd, (2) a malicious ldapfilter.conf file that is not properly handled by getfilter functions, (3) a malicious ldaptemplates.conf that causes an overflow in libldap, (4) a certain access control list that causes an overflow in slapd, or (5) a long generated filename for logging rejected replication requests.
network
low complexity
openldap
7.5
2002-01-31 CVE-2002-0045 slapd in OpenLDAP 2.0 through 2.0.19 allows local users, and anonymous users before 2.0.8, to conduct a "replace" action on access controls without any values, which causes OpenLDAP to delete non-mandatory attributes that would otherwise be protected by ACLs.
network
low complexity
openldap redhat
7.5
2001-07-16 CVE-2001-0977 Denial of Service vulnerability in OpenLDAP
slapd in OpenLDAP 1.x before 1.2.12, and 2.x before 2.0.8, allows remote attackers to cause a denial of service (crash) via an invalid Basic Encoding Rules (BER) length field.
network
low complexity
mandrakesoft openldap debian redhat
5.0
2000-10-20 CVE-2000-0748 Unspecified vulnerability in Openldap
OpenLDAP 1.2.11 and earlier improperly installs the ud binary with group write permissions, which could allow any user in that group to replace the binary with a Trojan horse.
local
low complexity
openldap
4.6