DescriptionAn off-by-one error leading to a crash was discovered in openldap 2.4 when processing DNS SRV messages. If slapd was configured to use the dnssrv backend, an attacker could crash the service with crafted DNS responses.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openldap (PTS)stretch (security), stretch2.4.44+dfsg-5+deb9u4fixed
buster, buster (security)2.4.47+dfsg-3+deb10u2fixed
bullseye, sid2.4.50+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
openldapsource(unstable)(not affected)


- openldap <not-affected> (Vulnerable code introduced in RHEL specific patch)
Reference for upstream fix:;a=blobdiff;f=libraries/libldap/dnssrv.c;h=de849e30d5b01ae855853c79e88fb06d7aea1137;hp=6d1bfa8e3c2b05ca5ed0ebebc00c3a30086bca95;hb=31995b535e10c45e698b62d39db998c51f799327;hpb=5de85b922aaa5bfa6eb53db6000adf01ebdb0736
and:;a=commitdiff;h=eef1ca007f60fdcb9b5368608e87dd0b2404bceb claims this flaw was never in a OpenLDAP release

Search for package or bug name: Reporting problems