RHEL 6 : openldap (RHSA-2014:0126)

Medium Nessus Plugin ID 72273


The remote Red Hat host is missing one or more security updates.


Updated openldap packages that fix one security issue and one bug are now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.

OpenLDAP is an open source suite of Lightweight Directory Access Protocol (LDAP) applications and development tools. LDAP is a set of protocols used to access and maintain distributed directory information services over an IP network. The openldap package contains configuration files, libraries, and documentation for OpenLDAP.

A denial of service flaw was found in the way the OpenLDAP server daemon (slapd) performed reference counting when using the rwm (rewrite/remap) overlay. A remote attacker able to query the OpenLDAP server could use this flaw to crash the server by immediately unbinding from the server after sending a search request.

Red Hat would like to thank Michael Vishchers from Seven Principles AG for reporting this issue.

This update also fixes the following bug :

* Previously, OpenLDAP did not properly handle a number of simultaneous updates. As a consequence, sending a number of parallel update requests to the server could cause a deadlock. With this update, a superfluous locking mechanism causing the deadlock has been removed, thus fixing the bug. (BZ#1056124)

All openldap users are advised to upgrade to these updated packages, which contain backported patches to correct these issues.


Update the affected packages.

See Also



Plugin Details

Severity: Medium

ID: 72273

File Name: redhat-RHSA-2014-0126.nasl

Version: $Revision: 1.10 $

Type: local

Agent: unix

Published: 2014/02/04

Modified: 2017/01/06

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 4.3

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:F/RL:ND/RC:ND

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:openldap, p-cpe:/a:redhat:enterprise_linux:openldap-clients, p-cpe:/a:redhat:enterprise_linux:openldap-debuginfo, p-cpe:/a:redhat:enterprise_linux:openldap-devel, p-cpe:/a:redhat:enterprise_linux:openldap-servers, p-cpe:/a:redhat:enterprise_linux:openldap-servers-sql, cpe:/o:redhat:enterprise_linux:6, cpe:/o:redhat:enterprise_linux:6.5

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2014/02/03

Reference Information

CVE: CVE-2013-4449

BID: 63190

OSVDB: 98656

RHSA: 2014:0126