Public Date:
909119: CVE-2013-0288 nss-pam-ldapd: FD_SET array index error, leading to stack-based buffer overflow

The MITRE CVE dictionary describes this issue as:

nss-pam-ldapd before 0.7.18 and 0.8.x before 0.8.11 allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code by performing a name lookup on an application with a large number of open file descriptors, which triggers a stack-based buffer overflow related to incorrect use of the FD_SET macro.

Find out more about CVE-2013-0288 from the MITRE CVE dictionary dictionary and NIST NVD.


Vulnerable. This issue affects the version of nss-pam-ldapd as shipped with Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this issue as having moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification:

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 5.1
Base Metrics AV:N/AC:H/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity High
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux version 6 (nss-pam-ldapd) RHSA-2013:0590 2013-03-04


Red Hat would like to thank Garth Mollett for reporting this issue.