CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
94.8%
It was discovered that OpenLDAP incorrectly handled Certificate Exact
Assertion processing. A remote attacker could possibly use this issue to
cause OpenLDAP to crash, resulting in a denial of service. (CVE-2020-36221)
It was discovered that OpenLDAP incorrectly handled saslAuthzTo processing.
A remote attacker could use this issue to cause OpenLDAP to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2020-36222, CVE-2020-36224, CVE-2020-36225, CVE-2020-36226)
It was discovered that OpenLDAP incorrectly handled Return Filter control
handling. A remote attacker could use this issue to cause OpenLDAP to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2020-36223)
It was discovered that OpenLDAP incorrectly handled certain cancel
operations. A remote attacker could possibly use this issue to cause
OpenLDAP to crash, resulting in a denial of service. (CVE-2020-36227)
It was discovered that OpenLDAP incorrectly handled Certificate List
Extract Assertion processing. A remote attacker could possibly use this
issue to cause OpenLDAP to crash, resulting in a denial of service.
(CVE-2020-36228)
It was discovered that OpenLDAP incorrectly handled X.509 DN parsing. A
remote attacker could possibly use this issue to cause OpenLDAP to crash,
resulting in a denial of service. (CVE-2020-36229, CVE-2020-36230)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 20.10 | noarch | slapd | < 2.4.53+dfsg-1ubuntu1.3 | UNKNOWN |
Ubuntu | 20.10 | noarch | ldap-utils | < 2.4.53+dfsg-1ubuntu1.3 | UNKNOWN |
Ubuntu | 20.10 | noarch | ldap-utils-dbgsym | < 2.4.53+dfsg-1ubuntu1.3 | UNKNOWN |
Ubuntu | 20.10 | noarch | libldap-2.4-2 | < 2.4.53+dfsg-1ubuntu1.3 | UNKNOWN |
Ubuntu | 20.10 | noarch | libldap-2.4-2-dbgsym | < 2.4.53+dfsg-1ubuntu1.3 | UNKNOWN |
Ubuntu | 20.10 | noarch | libldap-common | < 2.4.53+dfsg-1ubuntu1.3 | UNKNOWN |
Ubuntu | 20.10 | noarch | libldap2-dev | < 2.4.53+dfsg-1ubuntu1.3 | UNKNOWN |
Ubuntu | 20.10 | noarch | slapd-contrib | < 2.4.53+dfsg-1ubuntu1.3 | UNKNOWN |
Ubuntu | 20.10 | noarch | slapd-contrib-dbgsym | < 2.4.53+dfsg-1ubuntu1.3 | UNKNOWN |
Ubuntu | 20.10 | noarch | slapd-dbgsym | < 2.4.53+dfsg-1ubuntu1.3 | UNKNOWN |
ubuntu.com/security/CVE-2020-36221
ubuntu.com/security/CVE-2020-36222
ubuntu.com/security/CVE-2020-36223
ubuntu.com/security/CVE-2020-36224
ubuntu.com/security/CVE-2020-36225
ubuntu.com/security/CVE-2020-36226
ubuntu.com/security/CVE-2020-36227
ubuntu.com/security/CVE-2020-36228
ubuntu.com/security/CVE-2020-36229
ubuntu.com/security/CVE-2020-36230
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
94.8%