Lucene search

K
cve[email protected]CVE-2013-0288
HistoryMar 05, 2013 - 9:38 p.m.

CVE-2013-0288

2013-03-0521:38:55
CWE-119
web.nvd.nist.gov
47
cve-2013-0288
nss-pam-ldapd
denial of service
arbitrary code execution
buffer overflow

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.7 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

74.9%

nss-pam-ldapd before 0.7.18 and 0.8.x before 0.8.11 allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code by performing a name lookup on an application with a large number of open file descriptors, which triggers a stack-based buffer overflow related to incorrect use of the FD_SET macro.

Affected configurations

NVD
Node
arthurdejongnss-pam-ldapdMatch0.8.0
OR
arthurdejongnss-pam-ldapdMatch0.8.1
OR
arthurdejongnss-pam-ldapdMatch0.8.2
OR
arthurdejongnss-pam-ldapdMatch0.8.3
OR
arthurdejongnss-pam-ldapdMatch0.8.4
OR
arthurdejongnss-pam-ldapdMatch0.8.5
OR
arthurdejongnss-pam-ldapdMatch0.8.6
OR
arthurdejongnss-pam-ldapdMatch0.8.7
OR
arthurdejongnss-pam-ldapdMatch0.8.8
OR
arthurdejongnss-pam-ldapdMatch0.8.9
OR
arthurdejongnss-pam-ldapdMatch0.8.10
Node
arthurdejongnss-pam-ldapdRange0.7.17
OR
arthurdejongnss-pam-ldapdMatch0.1
OR
arthurdejongnss-pam-ldapdMatch0.2
OR
arthurdejongnss-pam-ldapdMatch0.2.1
OR
arthurdejongnss-pam-ldapdMatch0.3
OR
arthurdejongnss-pam-ldapdMatch0.4
OR
arthurdejongnss-pam-ldapdMatch0.4.1
OR
arthurdejongnss-pam-ldapdMatch0.5
OR
arthurdejongnss-pam-ldapdMatch0.6
OR
arthurdejongnss-pam-ldapdMatch0.6.0
OR
arthurdejongnss-pam-ldapdMatch0.6.1
OR
arthurdejongnss-pam-ldapdMatch0.6.2
OR
arthurdejongnss-pam-ldapdMatch0.6.3
OR
arthurdejongnss-pam-ldapdMatch0.6.4
OR
arthurdejongnss-pam-ldapdMatch0.6.5
OR
arthurdejongnss-pam-ldapdMatch0.6.6
OR
arthurdejongnss-pam-ldapdMatch0.6.7
OR
arthurdejongnss-pam-ldapdMatch0.6.7.1
OR
arthurdejongnss-pam-ldapdMatch0.6.7.2
OR
arthurdejongnss-pam-ldapdMatch0.6.8
OR
arthurdejongnss-pam-ldapdMatch0.6.9
OR
arthurdejongnss-pam-ldapdMatch0.6.10
OR
arthurdejongnss-pam-ldapdMatch0.6.11
OR
arthurdejongnss-pam-ldapdMatch0.6.12
OR
arthurdejongnss-pam-ldapdMatch0.7.0
OR
arthurdejongnss-pam-ldapdMatch0.7.1
OR
arthurdejongnss-pam-ldapdMatch0.7.2
OR
arthurdejongnss-pam-ldapdMatch0.7.3
OR
arthurdejongnss-pam-ldapdMatch0.7.4
OR
arthurdejongnss-pam-ldapdMatch0.7.5
OR
arthurdejongnss-pam-ldapdMatch0.7.6
OR
arthurdejongnss-pam-ldapdMatch0.7.7
OR
arthurdejongnss-pam-ldapdMatch0.7.8
OR
arthurdejongnss-pam-ldapdMatch0.7.9
OR
arthurdejongnss-pam-ldapdMatch0.7.10
OR
arthurdejongnss-pam-ldapdMatch0.7.11
OR
arthurdejongnss-pam-ldapdMatch0.7.12
OR
arthurdejongnss-pam-ldapdMatch0.7.13
OR
arthurdejongnss-pam-ldapdMatch0.7.14
OR
arthurdejongnss-pam-ldapdMatch0.7.15
OR
arthurdejongnss-pam-ldapdMatch0.7.16

References

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.7 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

74.9%