ID

VAR-201502-0067


CVE

CVE-2015-1546


TITLE

OpenLDAP of servers/slapd/filter.c Inside get_vrFilter Function double memory vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2015-001496

DESCRIPTION

Double free vulnerability in the get_vrFilter function in servers/slapd/filter.c in OpenLDAP 2.4.40 allows remote attackers to cause a denial of service (crash) via a crafted search query with a matched values control. OpenLDAP of servers/slapd/filter.c Inside get_vrFilter The function has a deficiency in freeing up memory twice, resulting in service disruption ( crash ) There are vulnerabilities that are put into a state. Supplementary information : CWE Vulnerability type by CWE-415: Double Free ( Double release ) Has been identified. OpenLDAP slapd is prone to multiple denial-of-service vulnerabilities. Successful exploits may allow an attacker to cause an affected application to crash, resulting in a denial-of-service condition. OpenLDAP is a free and open source implementation of the Lightweight Directory Access Protocol (LDAP) from the OpenLDAP Foundation in the United States, which is included in Linux distributions. The updated packages provides a solution for these security issues. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1545 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1546 _______________________________________________________________________ Updated Packages: Mandriva Business Server 2/X86_64: 8cf3267fdb2dd7fe3e3d45560bdb21d0 mbs2/x86_64/lib64ldap2.4_2-2.4.40-1.mbs2.x86_64.rpm 865d9a982ce84212ac326c3c1e765bd7 mbs2/x86_64/lib64ldap2.4_2-devel-2.4.40-1.mbs2.x86_64.rpm 5257553f4101f109f611fb4a1169e032 mbs2/x86_64/lib64ldap2.4_2-static-devel-2.4.40-1.mbs2.x86_64.rpm 559e20b8fb73db0a2596ae53debb1171 mbs2/x86_64/openldap-2.4.40-1.mbs2.x86_64.rpm d768c2cfd50d48df2c6d50cba2804f22 mbs2/x86_64/openldap-back_bdb-2.4.40-1.mbs2.x86_64.rpm ca1be9bfd5f8494412dacd1704446a3d mbs2/x86_64/openldap-back_mdb-2.4.40-1.mbs2.x86_64.rpm 10616f8ee850c96f6f31a56c04b2f5c8 mbs2/x86_64/openldap-back_sql-2.4.40-1.mbs2.x86_64.rpm abe8987076d7c071cf0556717824f968 mbs2/x86_64/openldap-clients-2.4.40-1.mbs2.x86_64.rpm 167cde52384ff479dbf66c9c3b9c1875 mbs2/x86_64/openldap-doc-2.4.40-1.mbs2.x86_64.rpm 7bb0cde0c37e82616d7e1c2f51339ea9 mbs2/x86_64/openldap-servers-2.4.40-1.mbs2.x86_64.rpm fa9deaf6135eb3443dfa4ea2d5906d03 mbs2/x86_64/openldap-servers-devel-2.4.40-1.mbs2.x86_64.rpm 712530d38d7091f1feab1b0f214d8440 mbs2/x86_64/openldap-testprogs-2.4.40-1.mbs2.x86_64.rpm e2a1576a5731e854ac0395c65014b8ea mbs2/x86_64/openldap-tests-2.4.40-1.mbs2.x86_64.rpm 38e739f91027490ef87474d6053b663f mbs2/SRPMS/openldap-2.4.40-1.mbs2.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/en/support/security/advisories/ If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iD8DBQFVFYFxmqjQ0CJFipgRApm0AJ4xcpT1u7CPnC7I7aiJTISBkiS08ACghGEn vp6R7J2vex/HG9fkmQLo5EI= =FTac -----END PGP SIGNATURE-----

Trust: 2.07

sources: NVD: CVE-2015-1546 // JVNDB: JVNDB-2015-001496 // BID: 72519 // VULHUB: VHN-79507 // PACKETSTORM: 131055

AFFECTED PRODUCTS

vendor:openldapmodel:openldapscope:eqversion:2.4.40

Trust: 1.8

vendor:applemodel:mac os xscope:eqversion:10.10.2

Trust: 1.6

vendor:opensusemodel:opensusescope:eqversion:13.2

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:13.1

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.10 to 10.10.2

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.8.5

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.9.5

Trust: 0.8

vendor:ubuntumodel:linuxscope:eqversion:15.04

Trust: 0.3

vendor:ubuntumodel:linuxscope:eqversion:14.10

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:14.04

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:oraclemodel:solarisscope:eqversion:11.2

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:0

Trust: 0.3

vendor:mandrivamodel:business serverscope:eqversion:1x8664

Trust: 0.3

vendor:mandrivamodel:business serverscope:eqversion:1

Trust: 0.3

vendor:debianmodel:slapdscope:eqversion:2.4.40

Trust: 0.3

vendor:debianmodel:slapdscope:eqversion:2.4.13

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.9.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.8.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.10.3

Trust: 0.3

sources: BID: 72519 // JVNDB: JVNDB-2015-001496 // CNNVD: CNNVD-201502-275 // NVD: CVE-2015-1546

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-1546
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-1546
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201502-275
value: MEDIUM

Trust: 0.6

VULHUB: VHN-79507
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-1546
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-79507
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-79507 // JVNDB: JVNDB-2015-001496 // CNNVD: CNNVD-201502-275 // NVD: CVE-2015-1546

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2015-001496 // NVD: CVE-2015-1546

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 131055 // CNNVD: CNNVD-201502-275

TYPE

Failure to Handle Exceptional Conditions

Trust: 0.3

sources: BID: 72519

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-001496

PATCH

title:APPLE-SA-2015-04-08-2 OS X 10.10.3 and Security Update 2015-004url:http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html

Trust: 0.8

title:HT204659url:https://support.apple.com/en-us/HT204659

Trust: 0.8

title:HT204659url:https://support.apple.com/ja-jp/HT204659

Trust: 0.8

title:#776991url:https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776991

Trust: 0.8

title:query caused slapd to stopurl:http://www.openldap.org/its/?findid=8046

Trust: 0.8

title:ITS#8046 fix vrFilter_freeurl:http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=2f1a2dd329b91afe561cd06b872d09630d4edb6a

Trust: 0.8

sources: JVNDB: JVNDB-2015-001496

EXTERNAL IDS

db:NVDid:CVE-2015-1546

Trust: 2.9

db:SECUNIAid:62787

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2015/02/07/3

Trust: 1.7

db:JVNid:JVNVU91828320

Trust: 0.8

db:JVNDBid:JVNDB-2015-001496

Trust: 0.8

db:CNNVDid:CNNVD-201502-275

Trust: 0.7

db:BIDid:72519

Trust: 0.3

db:VULHUBid:VHN-79507

Trust: 0.1

db:PACKETSTORMid:131055

Trust: 0.1

sources: VULHUB: VHN-79507 // BID: 72519 // JVNDB: JVNDB-2015-001496 // PACKETSTORM: 131055 // CNNVD: CNNVD-201502-275 // NVD: CVE-2015-1546

REFERENCES

url:http://www.openwall.com/lists/oss-security/2015/02/07/3

Trust: 1.7

url:http://secunia.com/advisories/62787

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2015/apr/msg00001.html

Trust: 1.1

url:http://www.openldap.org/its/?findid=8046

Trust: 1.1

url:https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776991

Trust: 1.1

url:https://support.apple.com/ht204659

Trust: 1.1

url:http://www.mandriva.com/security/advisories?name=mdvsa-2015:073

Trust: 1.1

url:http://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/100938

Trust: 1.1

url:http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3ba=commit%3bh=2f1a2dd329b91afe561cd06b872d09630d4edb6a

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1546

Trust: 0.9

url:http://jvn.jp/vu/jvnvu91828320/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-1546

Trust: 0.8

url:https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776988

Trust: 0.6

url:http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=c32e74763f77675b9e144126e375977ed6dc562c

Trust: 0.6

url:http://www.openldap.org/its/?findid=8027

Trust: 0.6

url:http://www.openldap.org/

Trust: 0.3

url:http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=2f1a2dd329b91afe561cd06b872d09630d4edb6a

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1545

Trust: 0.1

url:http://www.mandriva.com/en/support/security/

Trust: 0.1

url:http://www.mandriva.com/en/support/security/advisories/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1545

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1546

Trust: 0.1

sources: VULHUB: VHN-79507 // BID: 72519 // JVNDB: JVNDB-2015-001496 // PACKETSTORM: 131055 // CNNVD: CNNVD-201502-275 // NVD: CVE-2015-1546

CREDITS

Ryan Tandy

Trust: 0.3

sources: BID: 72519

SOURCES

db:VULHUBid:VHN-79507
db:BIDid:72519
db:JVNDBid:JVNDB-2015-001496
db:PACKETSTORMid:131055
db:CNNVDid:CNNVD-201502-275
db:NVDid:CVE-2015-1546

LAST UPDATE DATE

2024-11-23T21:02:27.609000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-79507date:2018-10-30T00:00:00
db:BIDid:72519date:2015-11-03T19:04:00
db:JVNDBid:JVNDB-2015-001496date:2015-04-10T00:00:00
db:CNNVDid:CNNVD-201502-275date:2015-02-13T00:00:00
db:NVDid:CVE-2015-1546date:2024-11-21T02:25:37.930

SOURCES RELEASE DATE

db:VULHUBid:VHN-79507date:2015-02-12T00:00:00
db:BIDid:72519date:2015-02-05T00:00:00
db:JVNDBid:JVNDB-2015-001496date:2015-02-18T00:00:00
db:PACKETSTORMid:131055date:2015-03-27T20:49:40
db:CNNVDid:CNNVD-201502-275date:2015-02-13T00:00:00
db:NVDid:CVE-2015-1546date:2015-02-12T16:59:07.097