Vulnerability Details CVE-2013-4449
The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.776
EPSS Ranking 98.9%
CVSS Severity
CVSS v2 Score 4.3
Products affected by CVE-2013-4449
-
cpe:2.3:a:openldap:openldap:-
-
cpe:2.3:a:openldap:openldap:2.0
-
cpe:2.3:a:openldap:openldap:2.3.29
-
cpe:2.3:a:openldap:openldap:2.4
-
cpe:2.3:a:openldap:openldap:2.4.10
-
cpe:2.3:a:openldap:openldap:2.4.11
-
cpe:2.3:a:openldap:openldap:2.4.12
-
cpe:2.3:a:openldap:openldap:2.4.13
-
cpe:2.3:a:openldap:openldap:2.4.14
-
cpe:2.3:a:openldap:openldap:2.4.15
-
cpe:2.3:a:openldap:openldap:2.4.16
-
cpe:2.3:a:openldap:openldap:2.4.17
-
cpe:2.3:a:openldap:openldap:2.4.18
-
cpe:2.3:a:openldap:openldap:2.4.19
-
cpe:2.3:a:openldap:openldap:2.4.20
-
cpe:2.3:a:openldap:openldap:2.4.21
-
cpe:2.3:a:openldap:openldap:2.4.22
-
cpe:2.3:a:openldap:openldap:2.4.23
-
cpe:2.3:a:openldap:openldap:2.4.24
-
cpe:2.3:a:openldap:openldap:2.4.25
-
cpe:2.3:a:openldap:openldap:2.4.26
-
cpe:2.3:a:openldap:openldap:2.4.27
-
cpe:2.3:a:openldap:openldap:2.4.28
-
cpe:2.3:a:openldap:openldap:2.4.29
-
cpe:2.3:a:openldap:openldap:2.4.30
-
cpe:2.3:a:openldap:openldap:2.4.31
-
cpe:2.3:a:openldap:openldap:2.4.32
-
cpe:2.3:a:openldap:openldap:2.4.33
-
cpe:2.3:a:openldap:openldap:2.4.34
-
cpe:2.3:a:openldap:openldap:2.4.35
-
cpe:2.3:a:openldap:openldap:2.4.36
-
cpe:2.3:a:openldap:openldap:2.4.6
-
cpe:2.3:a:openldap:openldap:2.4.7
-
cpe:2.3:a:openldap:openldap:2.4.8
-
cpe:2.3:a:openldap:openldap:2.4.9
-
cpe:2.3:o:debian:debian_linux:7.0
-
cpe:2.3:o:debian:debian_linux:8.0