OpenLDAP up to 2.4.56 X.509 DN Parsing decode.c ber_next_element denial of service
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.4 | $0-$5k | 0.00 |
Summary
A vulnerability marked as problematic has been reported in OpenLDAP up to 2.4.56. The impacted element is the function ber_next_element of the file decode.c of the component X.509 DN Parsing. The manipulation leads to denial of service.
This vulnerability is referenced as CVE-2020-36230. No exploit is available.
It is suggested to upgrade the affected component.
Details
A vulnerability, which was classified as problematic, has been found in OpenLDAP up to 2.4.56 (Directory Service Software). This issue affects the function ber_next_element of the file decode.c of the component X.509 DN Parsing. The manipulation with an unknown input leads to a denial of service vulnerability. Using CWE to declare the problem leads to CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use. Impacted is availability.
The weakness was published 01/27/2021. The advisory is shared at bugs.openldap.org. The identification of this vulnerability is CVE-2020-36230. Technical details are known, but no exploit is available.
The vulnerability scanner Nessus provides a plugin with the ID 258033 (Ubuntu 14.04 LTS : OpenLDAP vulnerabilities (USN-7713-1)), which helps to determine the existence of the flaw in a target environment.
Upgrading to version 2.4.57 eliminates this vulnerability. The upgrade is hosted for download at git.openldap.org. Applying a patch is able to eliminate this problem. The bugfix is ready for download at git.openldap.org. The best possible mitigation is suggested to be upgrading to the latest version.
The vulnerability is also documented in the vulnerability database at Tenable (258033). If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Product
Type
Name
Version
- 2.4.0
- 2.4.1
- 2.4.2
- 2.4.3
- 2.4.4
- 2.4.5
- 2.4.6
- 2.4.7
- 2.4.8
- 2.4.9
- 2.4.10
- 2.4.11
- 2.4.12
- 2.4.13
- 2.4.14
- 2.4.15
- 2.4.16
- 2.4.17
- 2.4.18
- 2.4.19
- 2.4.20
- 2.4.21
- 2.4.22
- 2.4.23
- 2.4.24
- 2.4.25
- 2.4.26
- 2.4.27
- 2.4.28
- 2.4.29
- 2.4.30
- 2.4.31
- 2.4.32
- 2.4.33
- 2.4.34
- 2.4.35
- 2.4.36
- 2.4.37
- 2.4.38
- 2.4.39
- 2.4.40
- 2.4.41
- 2.4.42
- 2.4.43
- 2.4.44
- 2.4.45
- 2.4.46
- 2.4.47
- 2.4.48
- 2.4.49
- 2.4.50
- 2.4.51
- 2.4.52
- 2.4.53
- 2.4.54
- 2.4.55
- 2.4.56
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.5VulDB Meta Temp Score: 5.4
VulDB Base Score: 3.5
VulDB Temp Score: 3.4
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 7.5
NVD Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Denial of serviceCWE: CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 258033
Nessus Name: Ubuntu 14.04 LTS : OpenLDAP vulnerabilities (USN-7713-1)
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: OpenLDAP 2.4.57
Patch: git.openldap.org
Timeline
01/25/2021 🔍01/27/2021 🔍
01/27/2021 🔍
08/28/2025 🔍
Sources
Advisory: bugs.openldap.orgStatus: Confirmed
CVE: CVE-2020-36230 (🔍)
GCVE (CVE): GCVE-0-2020-36230
GCVE (VulDB): GCVE-100-168725
Entry
Created: 01/27/2021 09:59Updated: 08/28/2025 07:53
Changes: 01/27/2021 09:59 (42), 02/20/2021 08:43 (5), 02/20/2021 08:46 (18), 08/28/2025 07:53 (17)
Complete: 🔍
Cache ID: 216::103
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
No comments yet. Languages: en.
Please log in to comment.