CVE-2021-27212

In OpenLDAP through 2.4.57 and 2.5.x through 2.5.1alpha, an assertion failure in slapd can occur in the issuerAndThisUpdateCheck function via a crafted packet, resulting in a denial of service (daemon exit) via a short timestamp. This is related to schema_init.c and checkTime.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.5.0:alpha:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.5.1:alpha:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

07 Nov 2023, 03:31

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E', 'name': '[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E', 'name': '[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MLIST'}
  • () https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E -
  • () https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E -

13 Sep 2021, 19:46

Type Values Removed Values Added
References
  • (MLIST) https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E - Mailing List, Third Party Advisory
References (MLIST) https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E - (MLIST) https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E - Mailing List, Third Party Advisory

29 Jun 2021, 15:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E -

26 Mar 2021, 13:00

Type Values Removed Values Added
References (CONFIRM) https://security.netapp.com/advisory/ntap-20210319-0005/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20210319-0005/ - Third Party Advisory
References (MISC) https://bugs.openldap.org/show_bug.cgi?id=9454 - Exploit, Vendor Advisory (MISC) https://bugs.openldap.org/show_bug.cgi?id=9454 - Exploit, Issue Tracking, Vendor Advisory

19 Mar 2021, 09:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20210319-0005/ -

22 Feb 2021, 21:21

Type Values Removed Values Added
References (DEBIAN) https://www.debian.org/security/2021/dsa-4860 - (DEBIAN) https://www.debian.org/security/2021/dsa-4860 - Third Party Advisory
References (MISC) https://git.openldap.org/openldap/openldap/-/commit/9badb73425a67768c09bcaed1a9c26c684af6c30 - (MISC) https://git.openldap.org/openldap/openldap/-/commit/9badb73425a67768c09bcaed1a9c26c684af6c30 - Patch, Vendor Advisory
References (MISC) https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0 - (MISC) https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0 - Patch, Vendor Advisory
References (MISC) https://bugs.openldap.org/show_bug.cgi?id=9454 - (MISC) https://bugs.openldap.org/show_bug.cgi?id=9454 - Exploit, Vendor Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2021/02/msg00035.html - (MLIST) https://lists.debian.org/debian-lts-announce/2021/02/msg00035.html - Mailing List, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
CWE CWE-617
CPE cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.5.1:alpha:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.5.0:alpha:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*

22 Feb 2021, 15:15

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2021/dsa-4860 -

20 Feb 2021, 21:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2021/02/msg00035.html -

14 Feb 2021, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-02-14 03:15

Updated : 2023-12-10 13:41


NVD link : CVE-2021-27212

Mitre link : CVE-2021-27212

CVE.ORG link : CVE-2021-27212


JSON object : View

Products Affected

debian

  • debian_linux

openldap

  • openldap
CWE
CWE-617

Reachable Assertion