{"id":"CVE-2020-25710","details":"A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23(). The highest threat from this vulnerability is to system availability.","aliases":["BIT-openldap-2020-25710"],"modified":"2026-04-16T04:34:21.871696360Z","published":"2021-05-28T11:15:07.593Z","related":["SUSE-SU-2021:0128-1","SUSE-SU-2021:0129-1","SUSE-SU-2021:0142-1","SUSE-SU-2021:14597-1","openSUSE-SU-2021:0102-1","openSUSE-SU-2021:0107-1"],"references":[{"type":"WEB","url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20210716-0003/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4792"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1899678"},{"type":"FIX","url":"https://git.openldap.org/openldap/openldap/-/commit/ab3915154e69920d480205b4bf5ccb2b391a0a1f#a2feb6ed0257c21c6672793ee2f94eaadc10c72c"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openldap/openldap","events":[{"introduced":"0"},{"fixed":"ab3915154e69920d480205b4bf5ccb2b391a0a1f"},{"introduced":"0"},{"last_affected":"060a5440efd3c03246d95515dc6f2004503876c4"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.4.56"},{"introduced":"0"},{"last_affected":"2.0.0"}]}}],"versions":["AUTOCONF_2_57","LDAP_3_3+prerelease","LDBM_POST_GIANT_RWLOCK","LDBM_PRE_GIANT_RWLOCK","NO_SLAP_OP_BLOCKS","OPENDLAP_REL_ENG_2_2_MP","OPENLDAP_AC_BP","OPENLDAP_REL_ENG_1_0_0","OPENLDAP_REL_ENG_2_0_0","OPENLDAP_REL_ENG_2_0_ALPHA","OPENLDAP_REL_ENG_2_0_ALPHA2","OPENLDAP_REL_ENG_2_0_ALPHA3","OPENLDAP_REL_ENG_2_0_ALPHA4","OPENLDAP_REL_ENG_2_0_BETA","OPENLDAP_REL_ENG_2_0_GAMMA","OPENLDAP_REL_ENG_2_1_BP","OPENLDAP_REL_ENG_2_1_MP","OPENLDAP_REL_ENG_2_2_BP","OPENLDAP_REL_ENG_2_2_MP","OPENLDAP_REL_ENG_2_3_BP","OPENLDAP_REL_ENG_2_4_0ALPHA","OPENLDAP_REL_ENG_2_4_10","OPENLDAP_REL_ENG_2_4_11","OPENLDAP_REL_ENG_2_4_12","OPENLDAP_REL_ENG_2_4_13","OPENLDAP_REL_ENG_2_4_14","OPENLDAP_REL_ENG_2_4_15","OPENLDAP_REL_ENG_2_4_16","OPENLDAP_REL_ENG_2_4_17","OPENLDAP_REL_ENG_2_4_18","OPENLDAP_REL_ENG_2_4_19","OPENLDAP_REL_ENG_2_4_1ALPHA","OPENLDAP_REL_ENG_2_4_20","OPENLDAP_REL_ENG_2_4_21","OPENLDAP_REL_ENG_2_4_22","OPENLDAP_REL_ENG_2_4_23","OPENLDAP_REL_ENG_2_4_24","OPENLDAP_REL_ENG_2_4_25","OPENLDAP_REL_ENG_2_4_26","OPENLDAP_REL_ENG_2_4_27","OPENLDAP_REL_ENG_2_4_28","OPENLDAP_REL_ENG_2_4_29","OPENLDAP_REL_ENG_2_4_2ALPHA","OPENLDAP_REL_ENG_2_4_30","OPENLDAP_REL_ENG_2_4_32","OPENLDAP_REL_ENG_2_4_33","OPENLDAP_REL_ENG_2_4_34","OPENLDAP_REL_ENG_2_4_35","OPENLDAP_REL_ENG_2_4_36","OPENLDAP_REL_ENG_2_4_37","OPENLDAP_REL_ENG_2_4_38","OPENLDAP_REL_ENG_2_4_39","OPENLDAP_REL_ENG_2_4_3ALPHA","OPENLDAP_REL_ENG_2_4_40","OPENLDAP_REL_ENG_2_4_41","OPENLDAP_REL_ENG_2_4_42","OPENLDAP_REL_ENG_2_4_43","OPENLDAP_REL_ENG_2_4_44","OPENLDAP_REL_ENG_2_4_45","OPENLDAP_REL_ENG_2_4_46","OPENLDAP_REL_ENG_2_4_47","OPENLDAP_REL_ENG_2_4_48","OPENLDAP_REL_ENG_2_4_49","OPENLDAP_REL_ENG_2_4_4ALPHA","OPENLDAP_REL_ENG_2_4_50","OPENLDAP_REL_ENG_2_4_51","OPENLDAP_REL_ENG_2_4_52","OPENLDAP_REL_ENG_2_4_53","OPENLDAP_REL_ENG_2_4_54","OPENLDAP_REL_ENG_2_4_55","OPENLDAP_REL_ENG_2_4_5BETA","OPENLDAP_REL_ENG_2_4_6","OPENLDAP_REL_ENG_2_4_7","OPENLDAP_REL_ENG_2_4_8","OPENLDAP_REL_ENG_2_4_9","OPENLDAP_REL_ENG_2_4_BP","OPENLDAP_REL_ENG_2_BP","OPENLDAP_REL_ENG_2_MP","OPENLDAP_SLAPD_BACK_LDAP","UMICH_LDAP_3_3"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"5.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"5.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"33"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-25710.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}