This script is Copyright (C) 2014-2015 Tenable Network Security, Inc.
The remote Amazon Linux AMI host is missing a security update.
The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not
properly count references, which allows remote attackers to cause a
denial of service (slapd crash) by unbinding immediately after a
search request, which triggers rwm_conn_destroy to free the session
context while it is being used by rwm_op_search.
See also :
Run 'yum update openldap' to update your system.
Risk factor :
Medium / CVSS Base Score : 4.3
Family: Amazon Linux Local Security Checks
Nessus Plugin ID: 72750 ()
CVE ID: CVE-2013-4449