{"id":"CVE-2017-9287","details":"servers/slapd/back-mdb/search.c in OpenLDAP through 2.4.44 is prone to a double free vulnerability. A user with access to search the directory can crash slapd by issuing a search including the Paged Results control with a page size of 0.","modified":"2026-04-16T06:21:21.325629258Z","published":"2017-05-29T16:29:00.273Z","related":["SUSE-SU-2017:1567-1","SUSE-SU-2019:0931-1"],"references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/98736"},{"type":"WEB","url":"http://www.securitytracker.com/id/1038591"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3868"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1852"},{"type":"ADVISORY","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10365"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"type":"FIX","url":"http://www.openldap.org/its/?findid=8655"},{"type":"FIX","url":"https://bugs.debian.org/863563"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openldap/openldap","events":[{"introduced":"0"},{"last_affected":"d690e90fec0ecba6e9eb47bfc7ef8e311dce9eac"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.4.44"}]}}],"versions":["AUTOCONF_2_57","LDAP_3_3+prerelease","LDBM_POST_GIANT_RWLOCK","LDBM_PRE_GIANT_RWLOCK","NO_SLAP_OP_BLOCKS","OPENDLAP_REL_ENG_2_2_MP","OPENLDAP_AC_BP","OPENLDAP_REL_ENG_1_0_0","OPENLDAP_REL_ENG_2_1_BP","OPENLDAP_REL_ENG_2_1_MP","OPENLDAP_REL_ENG_2_2_BP","OPENLDAP_REL_ENG_2_2_MP","OPENLDAP_REL_ENG_2_3_BP","OPENLDAP_REL_ENG_2_4_0ALPHA","OPENLDAP_REL_ENG_2_4_10","OPENLDAP_REL_ENG_2_4_11","OPENLDAP_REL_ENG_2_4_12","OPENLDAP_REL_ENG_2_4_13","OPENLDAP_REL_ENG_2_4_14","OPENLDAP_REL_ENG_2_4_15","OPENLDAP_REL_ENG_2_4_16","OPENLDAP_REL_ENG_2_4_17","OPENLDAP_REL_ENG_2_4_18","OPENLDAP_REL_ENG_2_4_19","OPENLDAP_REL_ENG_2_4_1ALPHA","OPENLDAP_REL_ENG_2_4_20","OPENLDAP_REL_ENG_2_4_21","OPENLDAP_REL_ENG_2_4_22","OPENLDAP_REL_ENG_2_4_23","OPENLDAP_REL_ENG_2_4_24","OPENLDAP_REL_ENG_2_4_25","OPENLDAP_REL_ENG_2_4_26","OPENLDAP_REL_ENG_2_4_27","OPENLDAP_REL_ENG_2_4_28","OPENLDAP_REL_ENG_2_4_29","OPENLDAP_REL_ENG_2_4_2ALPHA","OPENLDAP_REL_ENG_2_4_30","OPENLDAP_REL_ENG_2_4_32","OPENLDAP_REL_ENG_2_4_33","OPENLDAP_REL_ENG_2_4_34","OPENLDAP_REL_ENG_2_4_35","OPENLDAP_REL_ENG_2_4_36","OPENLDAP_REL_ENG_2_4_37","OPENLDAP_REL_ENG_2_4_38","OPENLDAP_REL_ENG_2_4_39","OPENLDAP_REL_ENG_2_4_3ALPHA","OPENLDAP_REL_ENG_2_4_40","OPENLDAP_REL_ENG_2_4_41","OPENLDAP_REL_ENG_2_4_42","OPENLDAP_REL_ENG_2_4_43","OPENLDAP_REL_ENG_2_4_44","OPENLDAP_REL_ENG_2_4_4ALPHA","OPENLDAP_REL_ENG_2_4_5BETA","OPENLDAP_REL_ENG_2_4_6","OPENLDAP_REL_ENG_2_4_7","OPENLDAP_REL_ENG_2_4_8","OPENLDAP_REL_ENG_2_4_9","OPENLDAP_REL_ENG_2_4_BP","OPENLDAP_REL_ENG_2_BP","OPENLDAP_REL_ENG_2_MP","OPENLDAP_SLAPD_BACK_LDAP"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-9287.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.5"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"fixed":"6.5.1"}]},{"events":[{"introduced":"0"},{"fixed":"21.1.2"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}