Show plain JSON{"id": "CVE-2013-0336", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2014-11-03T23:55:04.877", "references": [{"url": "http://secunia.com/advisories/52763", "source": "secalert@redhat.com"}, {"url": "http://www.securityfocus.com/bid/58747", "source": "secalert@redhat.com"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=913751", "source": "secalert@redhat.com"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83132", "source": "secalert@redhat.com"}, {"url": "https://fedorahosted.org/freeipa/ticket/3539", "tags": ["Patch"], "source": "secalert@redhat.com"}, {"url": "https://git.fedorahosted.org/cgit/freeipa.git/commit/?id=7b45e33400355df44e75576ef7f70a39d163bf8e", "tags": ["Exploit", "Patch"], "source": "secalert@redhat.com"}, {"url": "http://secunia.com/advisories/52763", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/58747", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=913751", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83132", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://fedorahosted.org/freeipa/ticket/3539", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://git.fedorahosted.org/cgit/freeipa.git/commit/?id=7b45e33400355df44e75576ef7f70a39d163bf8e", "tags": ["Exploit", "Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-20"}]}], "descriptions": [{"lang": "en", "value": "The ipapwd_chpwop function in daemons/ipa-slapi-plugins/ipa-pwd-extop/ipa_pwd_extop.c in the directory server (dirsrv) in FreeIPA before 3.2.0 allows remote attackers to cause a denial of service (crash) via a connection request without a username/dn, related to the 389 directory server."}, {"lang": "es", "value": "La funci\u00f3n ipapwd_chpwop en daemons/ipa-slapi-plugins/ipa-pwd-extop/ipa_pwd_extop.c en el servidor del directorio (dirsrv) en FreeIPA anterior a 3.2.0 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de una solicitud de conexi\u00f3n sin username/dn, relacionado con el servidor del directorio 389."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:redhat:freeipa:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3517EC39-6407-4EAC-B3A0-6150B6AEC5EA", "versionEndIncluding": "3.1.5"}, {"criteria": "cpe:2.3:a:redhat:freeipa:3.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9EC0B67-0A62-40DB-AB3D-47251D6A9A45"}, {"criteria": "cpe:2.3:a:redhat:freeipa:3.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4876ACC-1CF4-4674-8DD0-D64E028F5FE8"}, {"criteria": "cpe:2.3:a:redhat:freeipa:3.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4A987D93-5427-4954-8C6C-E7C295A09BF3"}, {"criteria": "cpe:2.3:a:redhat:freeipa:3.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5BED799E-F847-4FAD-8EE0-CAB1DA6C0558"}, {"criteria": "cpe:2.3:a:redhat:freeipa:3.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "289FB702-8C2E-41D1-A737-A0BB520E0058"}, {"criteria": "cpe:2.3:a:redhat:freeipa:3.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2030CF38-13FB-403B-865E-FED916A17B5A"}, {"criteria": "cpe:2.3:a:redhat:freeipa:3.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE5A3C50-BFE6-4453-B1E8-F29227B68828"}], "operator": "OR"}]}], "sourceIdentifier": "secalert@redhat.com"}