openldap is vulnerable to denial of service (DoS) attacks. The vulnerability exists as the rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.
kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
kb.juniper.net/InfoCenter/index?page=content&id=JSA10735
rhn.redhat.com/errata/RHSA-2014-0126.html
rhn.redhat.com/errata/RHSA-2014-0206.html
tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-4449
www.debian.org/security/2015/dsa-3209
www.mandriva.com/security/advisories?name=MDVSA-2014:026
www.openldap.org/its/index.cgi/Incoming?id=7723
www.openwall.com/lists/oss-security/2013/10/19/3
www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
www.securityfocus.com/bid/63190
www.securitytracker.com/id/1029711
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1019490
rhn.redhat.com/errata/RHSA-2014-0126.html