CVE-2021-3480NULL Pointer Dereference in Project Slapi-nis

Severity
7.5HIGHNVD
EPSS
1.8%
top 17.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 20
Latest updateMay 24

Description

A flaw was found in slapi-nis in versions before 0.56.7. A NULL pointer dereference during the parsing of the Binding DN could allow an unauthenticated attacker to crash the 389-ds-base directory server. The highest threat from this vulnerability is to system availability.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

debiandebian/slapi-nis< slapi-nis 0.56.5-2 (bookworm)
Debianslapi-nis_project/slapi-nis< 0.56.5-2+2
CVEListV5slapi-nis_project/slapi-nisslapi-nis 0.56.7

Also affects: Fedora 33, 34

Patches

🔴Vulnerability Details

2
GHSA
GHSA-7c98-4wpw-92jq: A flaw was found in slapi-nis in versions before 02022-05-24
OSV
CVE-2021-3480: A flaw was found in slapi-nis in versions before 02021-05-20

📋Vendor Advisories

2
Red Hat
slapi-nis: NULL dereference (DoS) with specially crafted Binding DN2021-05-17
Debian
CVE-2021-3480: slapi-nis - A flaw was found in slapi-nis in versions before 0.56.7. A NULL pointer derefere...2021
CVE-2021-3480 — NULL Pointer Dereference | cvebase