|Bugzilla:||909119: CVE-2013-0288 nss-pam-ldapd: FD_SET array index error, leading to stack-based buffer overflow|
The MITRE CVE dictionary describes this issue as:
nss-pam-ldapd before 0.7.18 and 0.8.x before 0.8.11 allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code by performing a name lookup on an application with a large number of open file descriptors, which triggers a stack-based buffer overflow related to incorrect use of the FD_SET macro.
Vulnerable. This issue affects the version of nss-pam-ldapd as shipped with Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this issue as having moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
CVSS v2 metrics
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Red Hat security errata
|Red Hat Enterprise Linux version 6 (nss-pam-ldapd)||RHSA-2013:0590||March 04, 2013|
Red Hat would like to thank Garth Mollett for reporting this issue.
This page is generated automatically and has not been checked for errors or omissions.
For clarification or corrections please contact the Red Hat Security Response Team.