CVE Database


Impact: Important
Public: 2013-02-18
Bugzilla: 909119: CVE-2013-0288 nss-pam-ldapd: FD_SET array index error, leading to stack-based buffer overflow


The MITRE CVE dictionary describes this issue as:

nss-pam-ldapd before 0.7.18 and 0.8.x before 0.8.11 allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code by performing a name lookup on an application with a large number of open file descriptors, which triggers a stack-based buffer overflow related to incorrect use of the FD_SET macro.

Find out more about CVE-2013-0288 from the MITRE CVE dictionary and NIST NVD.


Vulnerable. This issue affects the version of nss-pam-ldapd as shipped with Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this issue as having moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification:

CVSS v2 metrics

Base Score: 5.1
Base Metrics: AV:N/AC:H/Au:N/C:P/I:P/A:P
Access Vector: Network
Access Complexity: High
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
Red Hat Enterprise Linux version 6 (nss-pam-ldapd) RHSA-2013:0590 March 04, 2013

External References


Red Hat would like to thank Garth Mollett for reporting this issue.

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.