The bergetnext function in libraries/liblber/io.c in OpenLDAP 2.4.42 and earlier allows remote attackers to cause a denial of service (reachable assertion and application crash) via crafted BER data, as demonstrated by an attack against slapd.
{ "binaries": [ { "binary_name": "ldap-utils", "binary_version": "2.4.31-1+nmu2ubuntu8.2" }, { "binary_name": "ldap-utils-dbgsym", "binary_version": "2.4.31-1+nmu2ubuntu8.2" }, { "binary_name": "libldap-2.4-2", "binary_version": "2.4.31-1+nmu2ubuntu8.2" }, { "binary_name": "libldap-2.4-2-dbg", "binary_version": "2.4.31-1+nmu2ubuntu8.2" }, { "binary_name": "libldap-2.4-2-dbgsym", "binary_version": "2.4.31-1+nmu2ubuntu8.2" }, { "binary_name": "libldap2-dev", "binary_version": "2.4.31-1+nmu2ubuntu8.2" }, { "binary_name": "libldap2-dev-dbgsym", "binary_version": "2.4.31-1+nmu2ubuntu8.2" }, { "binary_name": "slapd", "binary_version": "2.4.31-1+nmu2ubuntu8.2" }, { "binary_name": "slapd-dbg", "binary_version": "2.4.31-1+nmu2ubuntu8.2" }, { "binary_name": "slapd-dbgsym", "binary_version": "2.4.31-1+nmu2ubuntu8.2" }, { "binary_name": "slapd-smbk5pwd", "binary_version": "2.4.31-1+nmu2ubuntu8.2" }, { "binary_name": "slapd-smbk5pwd-dbgsym", "binary_version": "2.4.31-1+nmu2ubuntu8.2" } ], "ubuntu_priority": "medium", "availability": "No subscription required" }