[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96078

 
 

909

 
 

78009

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2012-3429

Date: (C)2012-08-07   (M)2017-08-29
 
CVSS Score: 5.0Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 2.9Authentication: NONE
 Confidentiality: NONE
 Integrity: NONE
 Availability: PARTIAL











The dns_to_ldap_dn_escape function in src/ldap_convert.c in bind-dyndb-ldap 1.1.0rc1 and earlier does not properly escape distinguished names (DN) for LDAP queries, which allows remote DNS servers to cause a denial of service (named service hang) via a "$" character in a DN in a DNS query.

Reference:
SECTRACK-1027341
SECUNIA-50086
SECUNIA-50159
BID-54787
RHSA-2012:1139
http://www.openwall.com/lists/oss-security/2012/08/02/5
binddyndbldap-dnstoldapdnescape-dos(77391)
http://git.fedorahosted.org/cgit/bind-dyndb-ldap.git/commit/?id=f345805c73c294db42452ae966c48fbc36c48006
https://bugzilla.redhat.com/show_bug.cgi?id=842466

CPE    10
cpe:/a:martin_nagy:bind-dyndb-ldap:1.0.0:b1
cpe:/a:martin_nagy:bind-dyndb-ldap:0.2.0
cpe:/a:martin_nagy:bind-dyndb-ldap:1.1.0:rc1
cpe:/a:martin_nagy:bind-dyndb-ldap:1.0.0:rc1
...
CWE    1
CWE-20
OVAL    6
oval:org.secpod.oval:def:104063
oval:org.secpod.oval:def:500863
oval:org.secpod.oval:def:202416
oval:org.secpod.oval:def:104066
...

© 2013 SecPod Technologies