Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Directory)  >   OpenLDAP Vendors:
OpenLDAP BIND Request Lets Remote Users Deny Service
SecurityTracker Alert ID:  1017166
SecurityTracker URL:
CVE Reference:   CVE-2006-5779   (Links to External Site)
Updated:  Nov 9 2006
Original Entry Date:  Nov 7 2006
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 2.3.28 and prior versions
Description:   A vulnerability was reported in OpenLDAP. A remote user can cause denial of service conditions.

A remote user can send an LDAP BIND request with a specially crafted authcid parameter value to cause the target LDAP service to crash.

The vulnerability resides in 'libldap/getdn.c'.

A demonstration exploit (for Metasploit) is available at:

This vulnerability was reported by Evgeny Legerov.

Impact:   A remote user can cause the LDAP service to crash.
Solution:   The vendor has issued a fix, available via CVS.

The OpenLDAP bug report is available at:

Vendor URL: (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   None.

 Source Message Contents

Subject:  [Full-disclosure] VulnDisco Pack for Metasploit is available

Hi All,

I am glad to announce that free version of VulnDisco Pack for Metasploit
Framework 2.7 is available for download.

This release includes the following 0day exploits: - [0day] Query info from LDAP server - [0day] Omni-NFS Enterprise remote exploit - [0day] OpenLDAP DoS

You can download it here:

For more info about VulnDisco Pack for Metasploit please visit:

Best regards,
Evgeny Legerov

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, LLC