Description
Memory leak in the back-bdb backend for OpenLDAP 2.1.12 and earlier allows remote attackers to cause a denial of service (memory consumption).
Product(s):
- OpenLDAP OpenLDAP 1.0.1
- OpenLDAP OpenLDAP 1.0.2
- OpenLDAP OpenLDAP 1.0.3
- OpenLDAP 1.0
- OpenLDAP 1.1.0
- OpenLDAP 1.1.1
- OpenLDAP 1.1.2
- OpenLDAP 1.1.3
- OpenLDAP 1.1.4
- OpenLDAP 1.2.0
- OpenLDAP 1.2.10
- OpenLDAP 1.2.11
- OpenLDAP 1.2.12
- OpenLDAP 1.2.13
- OpenLDAP 1.2.1
- OpenLDAP 1.2.2
- OpenLDAP 1.2.3
- OpenLDAP 1.2.4
- OpenLDAP 1.2.5
- OpenLDAP 1.2.6
- OpenLDAP 1.2.7
- OpenLDAP 1.2.8
- OpenLDAP 1.2.9
- OpenLDAP 2.0.0
- OpenLDAP 2.0.10
- OpenLDAP 2.0.11
- OpenLDAP 2.0.12
- OpenLDAP 2.0.13
- OpenLDAP 2.0.14
- OpenLDAP 2.0.15
- OpenLDAP 2.0.16
- OpenLDAP 2.0.17
- OpenLDAP 2.0.18
- OpenLDAP 2.0.19
- OpenLDAP 2.0.1
- OpenLDAP 2.0.20
- OpenLDAP 2.0.21
- OpenLDAP 2.0.22
- OpenLDAP 2.0.23
- OpenLDAP 2.0.24
- OpenLDAP 2.0.25
- OpenLDAP 2.0.26
- OpenLDAP 2.0.27
- OpenLDAP 2.0.2
- OpenLDAP 2.0.3
- OpenLDAP 2.0.4
- OpenLDAP 2.0.5
- OpenLDAP 2.0.6
- OpenLDAP 2.0.7
- OpenLDAP 2.0.8
- OpenLDAP 2.0.9
- OpenLDAP 2.1.10
- OpenLDAP 2.1.11
- OpenLDAP 2.1.12
- OpenLDAP 2.1.2
- OpenLDAP 2.1.3
- OpenLDAP 2.1.4
- OpenLDAP 2.1.5
- OpenLDAP 2.1.6
- OpenLDAP 2.1.7
- OpenLDAP 2.1.8
- OpenLDAP 2.1.9
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2004-1880, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2004-1880 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.