ID

VAR-201509-0200


CVE

CVE-2015-6908


TITLE

OpenLDAP of libraries/liblber/io.c of ber_get_next Service disruption in functions (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-004685

DESCRIPTION

The ber_get_next function in libraries/liblber/io.c in OpenLDAP 2.4.42 and earlier allows remote attackers to cause a denial of service (reachable assertion and application crash) via crafted BER data, as demonstrated by an attack against slapd. OpenLDAP is prone to a denial-of-service vulnerability. Attackers can exploit this issue to crash the affected application denying service to legitimate users. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 APPLE-SA-2015-12-08-3 OS X El Capitan 10.11.2 and Security Update 2015-008 OS X El Capitan 10.11.2 and Security Update 2015-008 is now available and addresses the following: apache_mod_php Available for: OS X El Capitan v10.11 and v10.11.1 Impact: Multiple vulnerabilities in PHP Description: Multiple vulnerabilities existed in PHP versions prior to 5.5.29, the most serious of which may have led to remote code execution. These were addressed by updating PHP to version 5.5.30. CVE-ID CVE-2015-7803 CVE-2015-7804 AppSandbox Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A malicious application may maintain access to Contacts after having access revoked Description: An issue existed in the sandbox's handling of hard links. This issue was addressed through improved hardening of the app sandbox. CVE-ID CVE-2015-7001 : Razvan Deaconescu and Mihai Bucicoiu of University POLITEHNICA of Bucharest; Luke Deshotels and William Enck of North Carolina State University; Lucas Vincenzo Davi and Ahmad-Reza Sadeghi of TU Darmstadt Bluetooth Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A local user may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in the Bluetooth HCI interface. This issue was addressed through improved memory handling. CVE-ID CVE-2015-7108 : Ian Beer of Google Project Zero CFNetwork HTTPProtocol Available for: OS X El Capitan v10.11 and v10.11.1 Impact: An attacker with a privileged network position may be able to bypass HSTS Description: An input validation issue existed within URL processing. This issue was addressed through improved URL validation. CVE-ID CVE-2015-7094 : Tsubasa Iinuma (@llamakko_cafe) of Gehirn Inc. and Muneaki Nishimura (nishimunea) Compression Available for: OS X El Capitan v10.11 and v10.11.1 Impact: Visiting a maliciously crafted website may lead to arbitrary code execution Description: An uninitialized memory access issue existed in zlib. This issue was addressed through improved memory initialization and additional validation of zlib streams. CVE-ID CVE-2015-7054 : j00ru Configuration Profiles Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A local attacker may be able to install a configuration profile without admin privileges Description: An issue existed when installing configuration profiles. This issue was addressed through improved authorization checks. CVE-ID CVE-2015-7062 : David Mulder of Dell Software CoreGraphics Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 and v10.11.1 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: A memory corruption issue existed in the processing of font files. This issue was addressed through improved input validation. CVE-ID CVE-2015-7105 : John Villamil (@day6reak), Yahoo Pentest Team CoreMedia Playback Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 and v10.11.1 Impact: Visiting a maliciously crafted website may lead to arbitrary code execution Description: Multiple memory corruption issues existed in the processing of malformed media files. These issues were addressed through improved memory handling. CVE-ID CVE-2015-7074 : Apple CVE-2015-7075 Disk Images Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A local user may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue existed in the parsing of disk images. This issue was addressed through improved memory handling. CVE-ID CVE-2015-7110 : Ian Beer of Google Project Zero EFI Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A local user may be able to execute arbitrary code with system privileges Description: A path validation issue existed in the kernel loader. This was addressed through improved environment sanitization. CVE-ID CVE-2015-7063 : Apple File Bookmark Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: A path validation issue existed in app scoped bookmarks. This was addressed through improved environment sanitization. CVE-ID CVE-2015-7071 : Apple Hypervisor Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A local user may be able to execute arbitrary code with system privileges Description: A use after free issue existed in the handling of VM objects. This issue was addressed through improved memory management. CVE-ID CVE-2015-7078 : Ian Beer of Google Project Zero iBooks Available for: OS X El Capitan v10.11 and v10.11.1 Impact: Parsing a maliciously crafted iBooks file may lead to disclosure of user information Description: An XML external entity reference issue existed with iBook parsing. This issue was addressed through improved parsing. CVE-ID CVE-2015-7081 : Behrouz Sadeghipour (@Nahamsec) and Patrik Fehrenbach (@ITSecurityguard) ImageIO Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 and v10.11.1 Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: A memory corruption issue existed in ImageIO. This issue was addressed through improved memory handling. CVE-ID CVE-2015-7053 : Apple Intel Graphics Driver Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A local user may be able to execute arbitrary code with system privileges Description: A null pointer dereference issue was addressed through improved input validation. CVE-ID CVE-2015-7076 : Juwei Lin of TrendMicro, beist and ABH of BoB, and JeongHoon Shin@A.D.D Intel Graphics Driver Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A local user may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in the Intel Graphics Driver. This issue was addressed through improved memory handling. CVE-ID CVE-2015-7106 : Ian Beer of Google Project Zero, Juwei Lin of TrendMicro, beist and ABH of BoB, and JeongHoon Shin@A.D.D Intel Graphics Driver Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A local user may be able to execute arbitrary code with system privileges Description: An out of bounds memory access issue existed in the Intel Graphics Driver. This issue was addressed through improved memory handling. CVE-ID CVE-2015-7077 : Ian Beer of Google Project Zero IOAcceleratorFamily Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in IOAcceleratorFamily. This issue was addressed through improved memory handling. CVE-ID CVE-2015-7109 : Juwei Lin of TrendMicro IOHIDFamily Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: Multiple memory corruption issues existed in IOHIDFamily API. These issues were addressed through improved memory handling. CVE-ID CVE-2015-7111 : beist and ABH of BoB CVE-2015-7112 : Ian Beer of Google Project Zero IOKit SCSI Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A null pointer dereference existed in the handling of a certain userclient type. This issue was addressed through improved validation. CVE-ID CVE-2015-7068 : Ian Beer of Google Project Zero IOThunderboltFamily Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A local user may be able to cause a system denial of service Description: A null pointer dereference existed in IOThunderboltFamily's handling of certain userclient types. This issue was addressed through improved validation of IOThunderboltFamily contexts. CVE-ID CVE-2015-7067 : Juwei Lin of TrendMicro Kernel Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A local application may be able to cause a denial of service Description: Multiple denial of service issues were addressed through improved memory handling. CVE-ID CVE-2015-7040 : Lufeng Li of Qihoo 360 Vulcan Team CVE-2015-7041 : Lufeng Li of Qihoo 360 Vulcan Team CVE-2015-7042 : Lufeng Li of Qihoo 360 Vulcan Team CVE-2015-7043 : Tarjei Mandt (@kernelpool) Kernel Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A local user may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues existed in the kernel. These issues were addressed through improved memory handling. CVE-ID CVE-2015-7083 : Ian Beer of Google Project Zero CVE-2015-7084 : Ian Beer of Google Project Zero Kernel Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A local user may be able to execute arbitrary code with kernel privileges Description: An issue existed in the parsing of mach messages. This issue was addressed through improved validation of mach messages. CVE-ID CVE-2015-7047 : Ian Beer of Google Project Zero kext tools Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A local user may be able to execute arbitrary code with kernel privileges Description: A validation issue existed during the loading of kernel extensions. This issue was addressed through additional verification. CVE-ID CVE-2015-7052 : Apple Keychain Access Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A malicious application may be able to masquerade as the Keychain Server. Description: An issue existed in how Keychain Access interacted with Keychain Agent. This issue was resolved by removing legacy functionality. CVE-ID CVE-2015-7045 : Luyi Xing and XiaoFeng Wang of Indiana University Bloomington, Xiaolong Bai of Indiana University Bloomington and Tsinghua University, Tongxin Li of Peking University, Kai Chen of Indiana University Bloomington and Institute of Information Engineering, Xiaojing Liao of Georgia Institute of Technology, Shi- Min Hu of Tsinghua University, and Xinhui Han of Peking University libarchive Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 and v10.11.1 Impact: Visiting a maliciously crafted website may lead to arbitrary code execution Description: A memory corruption issue existed in the processing of archives. This issue was addressed through improved memory handling. CVE-ID CVE-2011-2895 : @practicalswift libc Available for: OS X El Capitan v10.11 and v10.11.1 Impact: Processing a maliciously crafted package may lead to arbitrary code execution Description: Multiple buffer overflows existed in the C standard library. These issues were addressed through improved bounds checking. CVE-ID CVE-2015-7038 CVE-2015-7039 : Maksymilian Arciemowicz (CXSECURITY.COM) libexpat Available for: OS X El Capitan v10.11 and v10.11.1 Impact: Multiple vulnerabilities in expat Description: Multiple vulnerabilities existed in expat version prior to 2.1.0. These were addressed by updating expat to versions 2.1.0. CVE-ID CVE-2012-0876 : Vincent Danen CVE-2012-1147 : Kurt Seifried CVE-2012-1148 : Kurt Seifried libxml2 Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 and v10.11.1 Impact: Parsing a maliciously crafted XML document may lead to disclosure of user information Description: A memory corruption issue existed in the parsing of XML files. This issue was addressed through improved memory handling. CVE-ID CVE-2015-3807 : Wei Lei and Liu Yang of Nanyang Technological University OpenGL Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 and v10.11.1 Impact: Visiting a maliciously crafted website may lead to arbitrary code execution Description: Multiple memory corruption issues existed in OpenGL. These issues were addressed through improved memory handling. CVE-ID CVE-2015-7064 : Apple CVE-2015-7065 : Apple CVE-2015-7066 : Tongbo Luo and Bo Qu of Palo Alto Networks OpenLDAP Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A remote unauthenticated client may be able to cause a denial of service Description: An input validation issue existed in OpenLDAP. This issue was addressed through improved input validation. CVE-ID CVE-2015-6908 OpenSSH Available for: OS X El Capitan v10.11 and v10.11.1 Impact: Multiple vulnerabilities in LibreSSL Description: Multiple vulnerabilities existed in LibreSSL versions prior to 2.1.8. These were addressed by updating LibreSSL to version 2.1.8. CVE-ID CVE-2015-5333 CVE-2015-5334 QuickLook Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 and v10.11.1 Impact: Opening a maliciously crafted iWork file may lead to arbitrary code execution Description: A memory corruption issue existed in the handling of iWork files. This issue was addressed through improved memory handling. CVE-ID CVE-2015-7107 Sandbox Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A malicious application with root privileges may be able to bypass kernel address space layout randomization Description: An insufficient privilege separation issue existed in xnu. This issue was addressed by improved authorization checks. CVE-ID CVE-2015-7046 : Apple Security Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A remote attacker may cause an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in handling SSL handshakes. This issue was addressed through improved memory handling. CVE-ID CVE-2015-7073 : Benoit Foucher of ZeroC, Inc. Security Available for: OS X Mavericks v10.9.5 and OS X Yosemite v10.10.5 Impact: Processing a maliciously crafted certificate may lead to arbitrary code execution Description: Multiple memory corruption issues existed in the ASN.1 decoder. These issues were addressed through improved input validation CVE-ID CVE-2015-7059 : David Keeler of Mozilla CVE-2015-7060 : Tyson Smith of Mozilla CVE-2015-7061 : Ryan Sleevi of Google Security Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 and v10.11.1 Impact: A malicious application may gain access to a user's Keychain items Description: An issue existed in the validation of access control lists for keychain items. This issue was addressed through improved access control list checks. CVE-ID CVE-2015-7058 System Integrity Protection Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A malicious application with root privileges may be able to execute arbitrary code with system privileges Description: A privilege issue existed in handling union mounts. This issue was addressed by improved authorization checks. CVE-ID CVE-2015-7044 : MacDefender Installation note: Security Update 2015-008 is recommended for all users and improves the security of OS X. After installing this update, the QuickTime 7 web browser plug-in will no longer be enabled by default. Learn what to do if you still need this legacy plug-in. https://support.apple.com/en-us/HT205081 OS X El Capitan v10.11.2 includes the security content of Safari 9.0.2: https://support.apple.com/en-us/HT205639 OS X El Capitan 10.11.2 and Security Update 2015-008 may be obtained from the Mac App Store or Apple's Software Downloads web site: http://www.apple.com/support/downloads/ Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iQIcBAEBCgAGBQJWZzzVAAoJEBcWfLTuOo7tQsMQAIBHD6EQQmEBqEqNqszdNS4j PE0wrKpgJUe79i5bUVXF3e8bK41+QGQzouceIaKK/r0aizEmUFbgvKG0BFCYacjn +XiDt0V4Itnf2VVvcjodEjVM8Os1BVl0G4tsrXfqJNJ8UmzqQfSFZZ0l+/yQW0rQ jtGYuBIezeWJ/2aA2l5qC89KgiWjmN9YzwpBUx3+02maWIJaKKIvUZy4b7xbQ4fz 0AKMHHh8u/xoPjAIpgXEpYuXM9XILabXkex3m5fp5roBipyimto/OomSsv/CuM5g OjMLz1ZL/dPf7yGaxSD+cTfdKJStTsm89VRWuE9MfAgWdFqjH8CpM9CT4nxX1Q8s Ima2Vk7R+VbyOJksB2fygBtfqBmIjX+fwm52WxhW0B5HabfKMbPjoBKLGIcPsH36 Num/gxdQ+0eswLLUzzorq3Qm2ptxoY6t/ceRAm0HE497+1+YVAKETwTbQTaBZqlB BhDfxk85wYfi7uuKJUH5NPP6j7sXrkJvMAuPJOXcY0QLhyxb96oD6yWaYGWjOGEY Z9zphs8o57l6YW1DWjvVNbZOon05bjIrepzkq6F9Q3TzCGTRgYL5BEAlgaREIZVx rfmFZHP3xM60SIHRKPiiADXo4dg6TvDJ6h8n+L/6OTdylxUf6bxQdoO5cmBhny1T gvIdn3N1k8hWpmYDjxZd =Yi/n -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: openldap security update Advisory ID: RHSA-2015:1840-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1840.html Issue date: 2015-09-29 CVE Names: CVE-2015-6908 ===================================================================== 1. Summary: Updated openldap packages that fix one security issue are now available for Red Hat Enterprise Linux 5, 6, and 7. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: OpenLDAP is an open source suite of Lightweight Directory Access Protocol (LDAP) applications and development tools. LDAP is a set of protocols used to access and maintain distributed directory information services over an IP network. The openldap package contains configuration files, libraries, and documentation for OpenLDAP. A flaw was found in the way the OpenLDAP server daemon (slapd) parsed certain Basic Encoding Rules (BER) data. A remote attacker could use this flaw to crash slapd via a specially crafted packet. (CVE-2015-6908) All openldap users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: openldap-2.3.43-29.el5_11.src.rpm i386: compat-openldap-2.3.43_2.2.29-29.el5_11.i386.rpm openldap-2.3.43-29.el5_11.i386.rpm openldap-clients-2.3.43-29.el5_11.i386.rpm openldap-debuginfo-2.3.43-29.el5_11.i386.rpm x86_64: compat-openldap-2.3.43_2.2.29-29.el5_11.i386.rpm compat-openldap-2.3.43_2.2.29-29.el5_11.x86_64.rpm openldap-2.3.43-29.el5_11.i386.rpm openldap-2.3.43-29.el5_11.x86_64.rpm openldap-clients-2.3.43-29.el5_11.x86_64.rpm openldap-debuginfo-2.3.43-29.el5_11.i386.rpm openldap-debuginfo-2.3.43-29.el5_11.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: openldap-2.3.43-29.el5_11.src.rpm i386: openldap-debuginfo-2.3.43-29.el5_11.i386.rpm openldap-devel-2.3.43-29.el5_11.i386.rpm openldap-servers-2.3.43-29.el5_11.i386.rpm openldap-servers-overlays-2.3.43-29.el5_11.i386.rpm openldap-servers-sql-2.3.43-29.el5_11.i386.rpm x86_64: openldap-debuginfo-2.3.43-29.el5_11.i386.rpm openldap-debuginfo-2.3.43-29.el5_11.x86_64.rpm openldap-devel-2.3.43-29.el5_11.i386.rpm openldap-devel-2.3.43-29.el5_11.x86_64.rpm openldap-servers-2.3.43-29.el5_11.x86_64.rpm openldap-servers-overlays-2.3.43-29.el5_11.x86_64.rpm openldap-servers-sql-2.3.43-29.el5_11.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: openldap-2.3.43-29.el5_11.src.rpm i386: compat-openldap-2.3.43_2.2.29-29.el5_11.i386.rpm openldap-2.3.43-29.el5_11.i386.rpm openldap-clients-2.3.43-29.el5_11.i386.rpm openldap-debuginfo-2.3.43-29.el5_11.i386.rpm openldap-devel-2.3.43-29.el5_11.i386.rpm openldap-servers-2.3.43-29.el5_11.i386.rpm openldap-servers-overlays-2.3.43-29.el5_11.i386.rpm openldap-servers-sql-2.3.43-29.el5_11.i386.rpm ia64: compat-openldap-2.3.43_2.2.29-29.el5_11.i386.rpm compat-openldap-2.3.43_2.2.29-29.el5_11.ia64.rpm openldap-2.3.43-29.el5_11.i386.rpm openldap-2.3.43-29.el5_11.ia64.rpm openldap-clients-2.3.43-29.el5_11.ia64.rpm openldap-debuginfo-2.3.43-29.el5_11.i386.rpm openldap-debuginfo-2.3.43-29.el5_11.ia64.rpm openldap-devel-2.3.43-29.el5_11.ia64.rpm openldap-servers-2.3.43-29.el5_11.ia64.rpm openldap-servers-overlays-2.3.43-29.el5_11.ia64.rpm openldap-servers-sql-2.3.43-29.el5_11.ia64.rpm ppc: compat-openldap-2.3.43_2.2.29-29.el5_11.ppc.rpm compat-openldap-2.3.43_2.2.29-29.el5_11.ppc64.rpm openldap-2.3.43-29.el5_11.ppc.rpm openldap-2.3.43-29.el5_11.ppc64.rpm openldap-clients-2.3.43-29.el5_11.ppc.rpm openldap-debuginfo-2.3.43-29.el5_11.ppc.rpm openldap-debuginfo-2.3.43-29.el5_11.ppc64.rpm openldap-devel-2.3.43-29.el5_11.ppc.rpm openldap-devel-2.3.43-29.el5_11.ppc64.rpm openldap-servers-2.3.43-29.el5_11.ppc.rpm openldap-servers-overlays-2.3.43-29.el5_11.ppc.rpm openldap-servers-sql-2.3.43-29.el5_11.ppc.rpm s390x: compat-openldap-2.3.43_2.2.29-29.el5_11.s390.rpm compat-openldap-2.3.43_2.2.29-29.el5_11.s390x.rpm openldap-2.3.43-29.el5_11.s390.rpm openldap-2.3.43-29.el5_11.s390x.rpm openldap-clients-2.3.43-29.el5_11.s390x.rpm openldap-debuginfo-2.3.43-29.el5_11.s390.rpm openldap-debuginfo-2.3.43-29.el5_11.s390x.rpm openldap-devel-2.3.43-29.el5_11.s390.rpm openldap-devel-2.3.43-29.el5_11.s390x.rpm openldap-servers-2.3.43-29.el5_11.s390x.rpm openldap-servers-overlays-2.3.43-29.el5_11.s390x.rpm openldap-servers-sql-2.3.43-29.el5_11.s390x.rpm x86_64: compat-openldap-2.3.43_2.2.29-29.el5_11.i386.rpm compat-openldap-2.3.43_2.2.29-29.el5_11.x86_64.rpm openldap-2.3.43-29.el5_11.i386.rpm openldap-2.3.43-29.el5_11.x86_64.rpm openldap-clients-2.3.43-29.el5_11.x86_64.rpm openldap-debuginfo-2.3.43-29.el5_11.i386.rpm openldap-debuginfo-2.3.43-29.el5_11.x86_64.rpm openldap-devel-2.3.43-29.el5_11.i386.rpm openldap-devel-2.3.43-29.el5_11.x86_64.rpm openldap-servers-2.3.43-29.el5_11.x86_64.rpm openldap-servers-overlays-2.3.43-29.el5_11.x86_64.rpm openldap-servers-sql-2.3.43-29.el5_11.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: openldap-2.4.40-6.el6_7.src.rpm i386: openldap-2.4.40-6.el6_7.i686.rpm openldap-clients-2.4.40-6.el6_7.i686.rpm openldap-debuginfo-2.4.40-6.el6_7.i686.rpm x86_64: openldap-2.4.40-6.el6_7.i686.rpm openldap-2.4.40-6.el6_7.x86_64.rpm openldap-clients-2.4.40-6.el6_7.x86_64.rpm openldap-debuginfo-2.4.40-6.el6_7.i686.rpm openldap-debuginfo-2.4.40-6.el6_7.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: openldap-debuginfo-2.4.40-6.el6_7.i686.rpm openldap-devel-2.4.40-6.el6_7.i686.rpm openldap-servers-2.4.40-6.el6_7.i686.rpm openldap-servers-sql-2.4.40-6.el6_7.i686.rpm x86_64: openldap-debuginfo-2.4.40-6.el6_7.i686.rpm openldap-debuginfo-2.4.40-6.el6_7.x86_64.rpm openldap-devel-2.4.40-6.el6_7.i686.rpm openldap-devel-2.4.40-6.el6_7.x86_64.rpm openldap-servers-2.4.40-6.el6_7.x86_64.rpm openldap-servers-sql-2.4.40-6.el6_7.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: openldap-2.4.40-6.el6_7.src.rpm x86_64: openldap-2.4.40-6.el6_7.i686.rpm openldap-2.4.40-6.el6_7.x86_64.rpm openldap-clients-2.4.40-6.el6_7.x86_64.rpm openldap-debuginfo-2.4.40-6.el6_7.i686.rpm openldap-debuginfo-2.4.40-6.el6_7.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: openldap-debuginfo-2.4.40-6.el6_7.i686.rpm openldap-debuginfo-2.4.40-6.el6_7.x86_64.rpm openldap-devel-2.4.40-6.el6_7.i686.rpm openldap-devel-2.4.40-6.el6_7.x86_64.rpm openldap-servers-2.4.40-6.el6_7.x86_64.rpm openldap-servers-sql-2.4.40-6.el6_7.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: openldap-2.4.40-6.el6_7.src.rpm i386: openldap-2.4.40-6.el6_7.i686.rpm openldap-clients-2.4.40-6.el6_7.i686.rpm openldap-debuginfo-2.4.40-6.el6_7.i686.rpm openldap-devel-2.4.40-6.el6_7.i686.rpm openldap-servers-2.4.40-6.el6_7.i686.rpm ppc64: openldap-2.4.40-6.el6_7.ppc.rpm openldap-2.4.40-6.el6_7.ppc64.rpm openldap-clients-2.4.40-6.el6_7.ppc64.rpm openldap-debuginfo-2.4.40-6.el6_7.ppc.rpm openldap-debuginfo-2.4.40-6.el6_7.ppc64.rpm openldap-devel-2.4.40-6.el6_7.ppc.rpm openldap-devel-2.4.40-6.el6_7.ppc64.rpm openldap-servers-2.4.40-6.el6_7.ppc64.rpm s390x: openldap-2.4.40-6.el6_7.s390.rpm openldap-2.4.40-6.el6_7.s390x.rpm openldap-clients-2.4.40-6.el6_7.s390x.rpm openldap-debuginfo-2.4.40-6.el6_7.s390.rpm openldap-debuginfo-2.4.40-6.el6_7.s390x.rpm openldap-devel-2.4.40-6.el6_7.s390.rpm openldap-devel-2.4.40-6.el6_7.s390x.rpm openldap-servers-2.4.40-6.el6_7.s390x.rpm x86_64: openldap-2.4.40-6.el6_7.i686.rpm openldap-2.4.40-6.el6_7.x86_64.rpm openldap-clients-2.4.40-6.el6_7.x86_64.rpm openldap-debuginfo-2.4.40-6.el6_7.i686.rpm openldap-debuginfo-2.4.40-6.el6_7.x86_64.rpm openldap-devel-2.4.40-6.el6_7.i686.rpm openldap-devel-2.4.40-6.el6_7.x86_64.rpm openldap-servers-2.4.40-6.el6_7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: openldap-debuginfo-2.4.40-6.el6_7.i686.rpm openldap-servers-sql-2.4.40-6.el6_7.i686.rpm ppc64: openldap-debuginfo-2.4.40-6.el6_7.ppc64.rpm openldap-servers-sql-2.4.40-6.el6_7.ppc64.rpm s390x: openldap-debuginfo-2.4.40-6.el6_7.s390x.rpm openldap-servers-sql-2.4.40-6.el6_7.s390x.rpm x86_64: openldap-debuginfo-2.4.40-6.el6_7.x86_64.rpm openldap-servers-sql-2.4.40-6.el6_7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: openldap-2.4.40-6.el6_7.src.rpm i386: openldap-2.4.40-6.el6_7.i686.rpm openldap-clients-2.4.40-6.el6_7.i686.rpm openldap-debuginfo-2.4.40-6.el6_7.i686.rpm openldap-devel-2.4.40-6.el6_7.i686.rpm openldap-servers-2.4.40-6.el6_7.i686.rpm x86_64: openldap-2.4.40-6.el6_7.i686.rpm openldap-2.4.40-6.el6_7.x86_64.rpm openldap-clients-2.4.40-6.el6_7.x86_64.rpm openldap-debuginfo-2.4.40-6.el6_7.i686.rpm openldap-debuginfo-2.4.40-6.el6_7.x86_64.rpm openldap-devel-2.4.40-6.el6_7.i686.rpm openldap-devel-2.4.40-6.el6_7.x86_64.rpm openldap-servers-2.4.40-6.el6_7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: openldap-debuginfo-2.4.40-6.el6_7.i686.rpm openldap-servers-sql-2.4.40-6.el6_7.i686.rpm x86_64: openldap-debuginfo-2.4.40-6.el6_7.x86_64.rpm openldap-servers-sql-2.4.40-6.el6_7.x86_64.rpm Red Hat Enterprise Linux Client (v. 7): Source: openldap-2.4.39-7.el7_1.src.rpm x86_64: openldap-2.4.39-7.el7_1.i686.rpm openldap-2.4.39-7.el7_1.x86_64.rpm openldap-clients-2.4.39-7.el7_1.x86_64.rpm openldap-debuginfo-2.4.39-7.el7_1.i686.rpm openldap-debuginfo-2.4.39-7.el7_1.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: openldap-debuginfo-2.4.39-7.el7_1.i686.rpm openldap-debuginfo-2.4.39-7.el7_1.x86_64.rpm openldap-devel-2.4.39-7.el7_1.i686.rpm openldap-devel-2.4.39-7.el7_1.x86_64.rpm openldap-servers-2.4.39-7.el7_1.x86_64.rpm openldap-servers-sql-2.4.39-7.el7_1.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: openldap-2.4.39-7.el7_1.src.rpm x86_64: openldap-2.4.39-7.el7_1.i686.rpm openldap-2.4.39-7.el7_1.x86_64.rpm openldap-clients-2.4.39-7.el7_1.x86_64.rpm openldap-debuginfo-2.4.39-7.el7_1.i686.rpm openldap-debuginfo-2.4.39-7.el7_1.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: openldap-debuginfo-2.4.39-7.el7_1.i686.rpm openldap-debuginfo-2.4.39-7.el7_1.x86_64.rpm openldap-devel-2.4.39-7.el7_1.i686.rpm openldap-devel-2.4.39-7.el7_1.x86_64.rpm openldap-servers-2.4.39-7.el7_1.x86_64.rpm openldap-servers-sql-2.4.39-7.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: openldap-2.4.39-7.el7_1.src.rpm ppc64: openldap-2.4.39-7.el7_1.ppc.rpm openldap-2.4.39-7.el7_1.ppc64.rpm openldap-clients-2.4.39-7.el7_1.ppc64.rpm openldap-debuginfo-2.4.39-7.el7_1.ppc.rpm openldap-debuginfo-2.4.39-7.el7_1.ppc64.rpm openldap-devel-2.4.39-7.el7_1.ppc.rpm openldap-devel-2.4.39-7.el7_1.ppc64.rpm openldap-servers-2.4.39-7.el7_1.ppc64.rpm s390x: openldap-2.4.39-7.el7_1.s390.rpm openldap-2.4.39-7.el7_1.s390x.rpm openldap-clients-2.4.39-7.el7_1.s390x.rpm openldap-debuginfo-2.4.39-7.el7_1.s390.rpm openldap-debuginfo-2.4.39-7.el7_1.s390x.rpm openldap-devel-2.4.39-7.el7_1.s390.rpm openldap-devel-2.4.39-7.el7_1.s390x.rpm openldap-servers-2.4.39-7.el7_1.s390x.rpm x86_64: openldap-2.4.39-7.el7_1.i686.rpm openldap-2.4.39-7.el7_1.x86_64.rpm openldap-clients-2.4.39-7.el7_1.x86_64.rpm openldap-debuginfo-2.4.39-7.el7_1.i686.rpm openldap-debuginfo-2.4.39-7.el7_1.x86_64.rpm openldap-devel-2.4.39-7.el7_1.i686.rpm openldap-devel-2.4.39-7.el7_1.x86_64.rpm openldap-servers-2.4.39-7.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: openldap-2.4.39-7.ael7b_1.src.rpm ppc64le: openldap-2.4.39-7.ael7b_1.ppc64le.rpm openldap-clients-2.4.39-7.ael7b_1.ppc64le.rpm openldap-debuginfo-2.4.39-7.ael7b_1.ppc64le.rpm openldap-devel-2.4.39-7.ael7b_1.ppc64le.rpm openldap-servers-2.4.39-7.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: openldap-debuginfo-2.4.39-7.el7_1.ppc64.rpm openldap-servers-sql-2.4.39-7.el7_1.ppc64.rpm s390x: openldap-debuginfo-2.4.39-7.el7_1.s390x.rpm openldap-servers-sql-2.4.39-7.el7_1.s390x.rpm x86_64: openldap-debuginfo-2.4.39-7.el7_1.x86_64.rpm openldap-servers-sql-2.4.39-7.el7_1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64le: openldap-debuginfo-2.4.39-7.ael7b_1.ppc64le.rpm openldap-servers-sql-2.4.39-7.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: openldap-2.4.39-7.el7_1.src.rpm x86_64: openldap-2.4.39-7.el7_1.i686.rpm openldap-2.4.39-7.el7_1.x86_64.rpm openldap-clients-2.4.39-7.el7_1.x86_64.rpm openldap-debuginfo-2.4.39-7.el7_1.i686.rpm openldap-debuginfo-2.4.39-7.el7_1.x86_64.rpm openldap-devel-2.4.39-7.el7_1.i686.rpm openldap-devel-2.4.39-7.el7_1.x86_64.rpm openldap-servers-2.4.39-7.el7_1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: openldap-debuginfo-2.4.39-7.el7_1.x86_64.rpm openldap-servers-sql-2.4.39-7.el7_1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-6908 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWCmcKXlSAg2UNWIIRAgn9AKC6H/fZbUDj3e0AyA/xkOrOx+U+/QCeIpMZ iKKXpo+XKDlK4zZLlWedI64= =yvhg -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . For the oldstable distribution (wheezy), this problem has been fixed in version 2.4.31-2+deb7u1. For the stable distribution (jessie), this problem has been fixed in version 2.4.40+dfsg-1+deb8u1. For the unstable distribution (sid), this problem has been fixed in version 2.4.42+dfsg-2. ============================================================================ Ubuntu Security Notice USN-2742-1 September 16, 2015 openldap vulnerabilities ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 15.04 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS Summary: Several security issues were fixed in OpenLDAP. (CVE-2015-6908) Dietrich Clauss discovered that the OpenLDAP package incorrectly shipped with a potentially unsafe default access control configuration. Depending on how the database is configure, this may allow users to impersonate others by modifying attributes such as their Unix user and group numbers. (CVE-2014-9713) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 15.04: slapd 2.4.31-1+nmu2ubuntu12.3 Ubuntu 14.04 LTS: slapd 2.4.31-1+nmu2ubuntu8.2 Ubuntu 12.04 LTS: slapd 2.4.28-1.1ubuntu4.6 In general, a standard system update will make all the necessary changes. For existing installations, access rules that begin with "to *" need to be manually adjusted to remove any instances of "by self write"

Trust: 2.43

sources: NVD: CVE-2015-6908 // JVNDB: JVNDB-2015-004685 // BID: 76714 // VULHUB: VHN-84869 // VULMON: CVE-2015-6908 // PACKETSTORM: 134748 // PACKETSTORM: 133775 // PACKETSTORM: 133529 // PACKETSTORM: 133573

AFFECTED PRODUCTS

vendor:openldapmodel:openldapscope:lteversion:2.4.42

Trust: 1.8

vendor:applemodel:mac os xscope:eqversion:10.11.1

Trust: 1.4

vendor:applemodel:mac os xscope:lteversion:10.11.1

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.11

Trust: 0.8

vendor:ibmmodel:flex system managerscope:eqversion:1.2.1.0

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.3.39

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.3.41

Trust: 0.3

vendor:ibmmodel:smartcloud entryscope:eqversion:3.2.0.3

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.9

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.3.25

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.0.21

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.16

Trust: 0.3

vendor:ibmmodel:smartcloud entry fix packscope:eqversion:3.2.09

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:smartcloud entry fix packscope:eqversion:3.211

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.0.25

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:5

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.0.22

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:1.1

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:ibmmodel:smartcloud entryscope:eqversion:2.3.0

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.3.43

Trust: 0.3

vendor:oraclemodel:vm server forscope:eqversion:x863.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.38

Trust: 0.3

vendor:ibmmodel:smartcloud entry fix packscope:eqversion:3.2.08

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:1.1.4

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.25

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:7

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.0.11

Trust: 0.3

vendor:ibmmodel:smartcloud entry fix packscope:eqversion:3.214

Trust: 0.3

vendor:ibmmodel:smartcloud entryscope:eqversion:3.2.0.1

Trust: 0.3

vendor:ibmmodel:smartcloud entry fpscope:eqversion:3.19

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fpscope:eqversion:3.1.0.4

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.0.6

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.2

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:1.0.2

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.28

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.0.3

Trust: 0.3

vendor:ibmmodel:smartcloud entry fix packscope:eqversion:3.1.08

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.11.2

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:1.2.11

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.30

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fix packscope:eqversion:2.24

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fpscope:eqversion:2.4.0.3

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.1

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:1.0

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.2.0.0

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7

Trust: 0.3

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fixpacscope:eqversion:3.2

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:1.1.3

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.0.16

Trust: 0.3

vendor:ibmmodel:smartcloud entry jre updatescope:eqversion:2.3.0.34

Trust: 0.3

vendor:ibmmodel:smartcloud entry fix packscope:eqversion:3.213

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.1.13

Trust: 0.3

vendor:ibmmodel:smartcloud entry fix packscope:eqversion:3.219

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:1.2.1

Trust: 0.3

vendor:ubuntumodel:linuxscope:eqversion:15.04

Trust: 0.3

vendor:ibmmodel:smartcloud entry fix packscope:eqversion:3.113

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fiscope:eqversion:2.2.0.4

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:1.0.1

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.15

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fix packscope:eqversion:3.11

Trust: 0.3

vendor:ibmmodel:smartcloud entryscope:eqversion:3.1.0.2

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.32

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.0.13

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fix packscope:eqversion:3.22

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.8

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.22

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:1.2.10

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.36

Trust: 0.3

vendor:ibmmodel:smartcloud entry fix packscope:eqversion:3.2.010

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:1.2.7

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.11

Trust: 0.3

vendor:ibmmodel:smartcloud entry fix packscope:eqversion:2.22

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.4.0

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:1.2

Trust: 0.3

vendor:ibmmodel:smartcloud entry fix packscope:eqversion:3.110

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fixpackscope:eqversion:3.221

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.3.40

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.33

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.26

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.12

Trust: 0.3

vendor:ibmmodel:smartcloud entryscope:eqversion:3.1.0.1

Trust: 0.3

vendor:ibmmodel:smartcloud entryscope:eqversion:3.2.0.2

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.10

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.0.5

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.0.14

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.35

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fix packscope:eqversion:2.36

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:1.1.2

Trust: 0.3

vendor:ibmmodel:smartcloud entryscope:eqversion:3.1.0.3

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.18

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.1.0

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.1.25

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.1.15

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fix packscope:eqversion:3.21

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.23

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.1.12

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.42

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.39

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.14

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:1.2.8

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.24

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fixpackscope:eqversion:3.222

Trust: 0.3

vendor:ibmmodel:smartcloud entryscope:eqversion:3.2.0.4

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.27

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.17

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.1.0.0

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.1.22

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:14.04

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.1.11

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.1.10

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:1.2.3

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.7

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.2.26

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:6

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.1.18

Trust: 0.3

vendor:ibmmodel:smartcloud entry fix packscope:eqversion:2.32

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.0.23

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:1.2.5

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fix packscope:eqversion:2.44

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fix packscope:eqversion:3.12

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:1.2.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11.1

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fpscope:eqversion:2.3.0.3

Trust: 0.3

vendor:ibmmodel:smartcloud entryscope:eqversion:3.1.0.0

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.37

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.1.14

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.0.2

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.31

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.19

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.0.7

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:13.1

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.0.20

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fix packscope:eqversion:2.46

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fix packscope:eqversion:2.34

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.1.4

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:1.0.3

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.41

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.3.27

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fix packscope:eqversion:2.26

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.13

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.1.30

Trust: 0.3

vendor:ibmmodel:smartcloud entryscope:eqversion:3.2.0.0

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.0.9

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.2.15

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.3.6

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.1.17

Trust: 0.3

vendor:ibmmodel:smartcloud entryscope:eqversion:3.2

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.0.19

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:1.2.9

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.0.27

Trust: 0.3

vendor:oraclemodel:linuxscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fiscope:eqversion:2.4.0.4

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.3.0

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.0.17

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.0.1

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.6

Trust: 0.3

vendor:ibmmodel:smartcloud entryscope:eqversion:2.2

Trust: 0.3

vendor:ibmmodel:flex system chassis management module 2petscope: - version: -

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.0.4

Trust: 0.3

vendor:ibmmodel:smartcloud entry fix packscope:eqversion:2.21

Trust: 0.3

vendor:ibmmodel:smartcloud entry fix packscope:eqversion:3.1.09

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.0.12

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.0.0

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.0.18

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fpscope:eqversion:3.2.0.4

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.29

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.0.10

Trust: 0.3

vendor:ibmmodel:smartcloud entry jre updatescope:eqversion:2.3.0.35

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.20

Trust: 0.3

vendor:ibmmodel:smartcloud entry fixpackscope:eqversion:2.3.0.33

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:1.2.12

Trust: 0.3

vendor:applemodel:mac os security updatescope:neversion:x2015

Trust: 0.3

vendor:oraclemodel:vm server forscope:eqversion:x863.3

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:1.2.13

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:1.2.4

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:1.1.1

Trust: 0.3

vendor:ibmmodel:smartcloud entry fix packscope:eqversion:2.31

Trust: 0.3

vendor:ibmmodel:smartcloud entry fix packscope:eqversion:3.218

Trust: 0.3

vendor:ibmmodel:smartcloud entryscope:eqversion:3.1.0.4

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.2.29

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.0

Trust: 0.3

vendor:ibmmodel:smartcloud entry fix packscope:eqversion:2.42

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.34

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:7

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.40

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.20

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.2.6

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.1.19

Trust: 0.3

vendor:ibmmodel:smartcloud entryscope:eqversion:3.1

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.1.16

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.21

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fiscope:eqversion:2.3.0.4

Trust: 0.3

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.0.15

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.0.1

Trust: 0.3

vendor:oraclemodel:vm server forscope:eqversion:x863.2

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:13.2

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:1.2.2

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fpscope:eqversion:2.2.0.3

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.4.3

Trust: 0.3

vendor:ibmmodel:smartcloud entry fix packscope:eqversion:2.4.01

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.0.8

Trust: 0.3

sources: BID: 76714 // JVNDB: JVNDB-2015-004685 // CNNVD: CNNVD-201509-148 // NVD: CVE-2015-6908

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-6908
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-6908
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201509-148
value: MEDIUM

Trust: 0.6

VULHUB: VHN-84869
value: MEDIUM

Trust: 0.1

VULMON: CVE-2015-6908
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-6908
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-84869
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-84869 // VULMON: CVE-2015-6908 // JVNDB: JVNDB-2015-004685 // CNNVD: CNNVD-201509-148 // NVD: CVE-2015-6908

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-84869 // JVNDB: JVNDB-2015-004685 // NVD: CVE-2015-6908

THREAT TYPE

remote

Trust: 0.9

sources: PACKETSTORM: 133775 // PACKETSTORM: 133529 // PACKETSTORM: 133573 // CNNVD: CNNVD-201509-148

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201509-148

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-004685

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-84869 // VULMON: CVE-2015-6908

PATCH

title:APPLE-SA-2015-12-08-3 OS X El Capitan 10.11.2 and Security Update 2015-008url:http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html

Trust: 0.8

title:HT205637url:https://support.apple.com/en-us/HT205637

Trust: 0.8

title:HT205637url:http://support.apple.com/ja-jp/HT205637

Trust: 0.8

title:ITS#8240 remove obsolete asserturl:http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=6fe51a9ab04fd28bbc171da3cf12f1c1040d6629

Trust: 0.8

title:Software Bugs/8240url:http://www.openldap.org/its/index.cgi/Software%20Bugs?id=8240

Trust: 0.8

title:TLSA-2016-1url:http://www.turbolinux.co.jp/security/2016/TLSA-2016-1j.html

Trust: 0.8

title:openldap.git-6fe51a9ab04fd28bbc171da3cf12f1c1040d6629url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=57727

Trust: 0.6

title:Debian CVElist Bug Report Logs: openldap: CVE-2015-6908: ber_get_next denial of service vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=4f5afc1a94fc95c218586f6ada83f20e

Trust: 0.1

title:Debian Security Advisories: DSA-3356-1 openldap -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=b361240a82d2fc06ecd3518f18637117

Trust: 0.1

title:Ubuntu Security Notice: openldap vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2742-1

Trust: 0.1

title:Amazon Linux AMI: ALAS-2015-599url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2015-599

Trust: 0.1

title:Apple: OS X El Capitan 10.11.2, Security Update 2015-005 Yosemite, and Security Update 2015-008 Mavericksurl:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=b4f5fe7974fd9e73002edba00722e010

Trust: 0.1

title:Oracle VM Server for x86 Bulletins: Oracle VM Server for x86 Bulletin - July 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_vm_server_for_x86_bulletins&qid=6c15273f6bf4a785175f27073b98a1ce

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - October 2015url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=435ed9abc2fb1e74ce2a69605a01e326

Trust: 0.1

sources: VULMON: CVE-2015-6908 // JVNDB: JVNDB-2015-004685 // CNNVD: CNNVD-201509-148

EXTERNAL IDS

db:NVDid:CVE-2015-6908

Trust: 3.3

db:BIDid:76714

Trust: 1.5

db:SECTRACKid:1033534

Trust: 1.2

db:JVNid:JVNVU97526033

Trust: 0.8

db:JVNDBid:JVNDB-2015-004685

Trust: 0.8

db:CNNVDid:CNNVD-201509-148

Trust: 0.7

db:PACKETSTORMid:133775

Trust: 0.2

db:PACKETSTORMid:133529

Trust: 0.2

db:EXPLOIT-DBid:38145

Trust: 0.2

db:VULHUBid:VHN-84869

Trust: 0.1

db:VULMONid:CVE-2015-6908

Trust: 0.1

db:PACKETSTORMid:134748

Trust: 0.1

db:PACKETSTORMid:133573

Trust: 0.1

sources: VULHUB: VHN-84869 // VULMON: CVE-2015-6908 // BID: 76714 // JVNDB: JVNDB-2015-004685 // PACKETSTORM: 134748 // PACKETSTORM: 133775 // PACKETSTORM: 133529 // PACKETSTORM: 133573 // CNNVD: CNNVD-201509-148 // NVD: CVE-2015-6908

REFERENCES

url:http://rhn.redhat.com/errata/rhsa-2015-1840.html

Trust: 1.6

url:http://www.openldap.org/its/index.cgi/software%20bugs?id=8240

Trust: 1.5

url:http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html

Trust: 1.5

url:http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

Trust: 1.5

url:http://www.security-assessment.com/files/documents/advisory/openldap-ber_get_next-denial-of-service.pdf

Trust: 1.5

url:http://www.ubuntu.com/usn/usn-2742-1

Trust: 1.3

url:http://lists.apple.com/archives/security-announce/2015/dec/msg00005.html

Trust: 1.2

url:http://www.securityfocus.com/bid/76714

Trust: 1.2

url:https://support.apple.com/ht205637

Trust: 1.2

url:http://www.debian.org/security/2015/dsa-3356

Trust: 1.2

url:http://www.securitytracker.com/id/1033534

Trust: 1.2

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html

Trust: 1.2

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html

Trust: 1.2

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html

Trust: 1.2

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html

Trust: 1.2

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html

Trust: 1.2

url:http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3ba=commit%3bh=6fe51a9ab04fd28bbc171da3cf12f1c1040d6629

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6908

Trust: 0.8

url:http://jvn.jp/vu/jvnvu97526033/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6908

Trust: 0.8

url:https://www.ibm.com/blogs/psirt/security-bulletin-security-vulnerabilities-have-been-identified-in-bigfix-platform-shipped-with-ibm-license-metric-tool-2/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2015-6908

Trust: 0.4

url:http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commitdiff;h=6fe51a9ab04fd28bbc171da3cf12f1c1040d6629

Trust: 0.3

url:http://www.openldap.org/

Trust: 0.3

url:https://bugzilla.redhat.com/show_bug.cgi?id=1262393

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1023640

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1024650

Trust: 0.3

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5099421

Trust: 0.3

url:http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=6fe51a9ab04fd28bbc171da3cf12f1c1040d6629

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=41267

Trust: 0.1

url:https://www.exploit-db.com/exploits/38145/

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://usn.ubuntu.com/2742-1/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3807

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7052

Trust: 0.1

url:https://support.apple.com/kb/ht201222

Trust: 0.1

url:https://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7045

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7044

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7047

Trust: 0.1

url:http://www.apple.com/support/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7046

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7060

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7043

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7058

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7053

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7042

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0876

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2895

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7059

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7001

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5334

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7039

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7040

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7054

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7063

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5333

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7062

Trust: 0.1

url:https://support.apple.com/en-us/ht205081

Trust: 0.1

url:https://support.apple.com/en-us/ht205639

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7061

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-1148

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7041

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-1147

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7038

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-6908

Trust: 0.1

url:https://bugzilla.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openldap/2.4.28-1.1ubuntu4.6

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openldap/2.4.31-1+nmu2ubuntu12.3

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openldap/2.4.31-1+nmu2ubuntu8.2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-9713

Trust: 0.1

sources: VULHUB: VHN-84869 // VULMON: CVE-2015-6908 // BID: 76714 // JVNDB: JVNDB-2015-004685 // PACKETSTORM: 134748 // PACKETSTORM: 133775 // PACKETSTORM: 133529 // PACKETSTORM: 133573 // CNNVD: CNNVD-201509-148 // NVD: CVE-2015-6908

CREDITS

Denis Andzakovic

Trust: 0.3

sources: BID: 76714

SOURCES

db:VULHUBid:VHN-84869
db:VULMONid:CVE-2015-6908
db:BIDid:76714
db:JVNDBid:JVNDB-2015-004685
db:PACKETSTORMid:134748
db:PACKETSTORMid:133775
db:PACKETSTORMid:133529
db:PACKETSTORMid:133573
db:CNNVDid:CNNVD-201509-148
db:NVDid:CVE-2015-6908

LAST UPDATE DATE

2024-11-23T20:26:35.755000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-84869date:2016-12-22T00:00:00
db:VULMONid:CVE-2015-6908date:2016-12-22T00:00:00
db:BIDid:76714date:2017-01-12T00:13:00
db:JVNDBid:JVNDB-2015-004685date:2016-01-19T00:00:00
db:CNNVDid:CNNVD-201509-148date:2020-07-27T00:00:00
db:NVDid:CVE-2015-6908date:2024-11-21T02:35:50.517

SOURCES RELEASE DATE

db:VULHUBid:VHN-84869date:2015-09-11T00:00:00
db:VULMONid:CVE-2015-6908date:2015-09-11T00:00:00
db:BIDid:76714date:2015-09-10T00:00:00
db:JVNDBid:JVNDB-2015-004685date:2015-09-15T00:00:00
db:PACKETSTORMid:134748date:2015-12-10T17:16:36
db:PACKETSTORMid:133775date:2015-09-30T03:52:34
db:PACKETSTORMid:133529date:2015-09-15T04:46:26
db:PACKETSTORMid:133573date:2015-09-17T03:30:33
db:CNNVDid:CNNVD-201509-148date:2015-09-14T00:00:00
db:NVDid:CVE-2015-6908date:2015-09-11T16:59:12.800