Upstream information
CVE-2021-3480 at MITRE
Description
A flaw was found in slapi-nis in versions before 0.56.7. A NULL pointer dereference during the parsing of the Binding DN could allow an unauthenticated attacker to crash the 389-ds-base directory server. The highest threat from this vulnerability is to system availability.
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having important severity.
CVSS v2 Scores
| CVSS detail |  National Vulnerability Database | 
| Base Score |  5 | 
| Vector |  AV:N/AC:L/Au:N/C:N/I:N/A:P | 
| Access Vector |  Network | 
| Access Complexity |  Low | 
| Authentication |  None | 
| Confidentiality Impact |  None | 
| Integrity Impact |  None | 
| Availability Impact |  Partial | 
CVSS v3 Scores
| CVSS detail |  National Vulnerability Database | 
| Base Score |  7.5 | 
| Vector |  CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | 
| Attack Vector |  Network | 
| Attack Complexity |  Low | 
| Privileges Required |  None | 
| User Interaction |  None | 
| Scope |  Unchanged | 
| Confidentiality Impact |  None | 
| Integrity Impact |  None | 
| Availability Impact |  High | 
| CVSSv3 Version |  3.1 | 
No SUSE Bugzilla entries cross referenced.
No SUSE Security Announcements cross referenced.
List of released packages
| Product(s) |  Fixed package version(s) |  References | 
| SUSE Liberty Linux 7 |  slapi-nis >= 0.56.5-4.el7_9 
  |  Patchnames:  RHSA-2021:2032 | 
| SUSE Liberty Linux 8 |  bind-dyndb-ldap >= 11.6-2.module+el8.4.0+9328+4ec4e316 
 custodia >= 0.6.0-3.module+el8.1.0+4098+f286395e 
 ipa-client >= 4.9.2-3.module+el8.4.0+10412+5ecb5b37 
 ipa-client-common >= 4.9.2-3.module+el8.4.0+10412+5ecb5b37 
 ipa-client-epn >= 4.9.2-3.module+el8.4.0+10412+5ecb5b37 
 ipa-client-samba >= 4.9.2-3.module+el8.4.0+10412+5ecb5b37 
 ipa-common >= 4.9.2-3.module+el8.4.0+10412+5ecb5b37 
 ipa-healthcheck >= 0.7-3.module+el8.4.0+9007+5084bdd8 
 ipa-healthcheck-core >= 0.7-3.module+el8.4.0+9007+5084bdd8 
 ipa-python-compat >= 4.9.2-3.module+el8.4.0+10412+5ecb5b37 
 ipa-selinux >= 4.9.2-3.module+el8.4.0+10412+5ecb5b37 
 ipa-server >= 4.9.2-3.module+el8.4.0+10412+5ecb5b37 
 ipa-server-common >= 4.9.2-3.module+el8.4.0+10412+5ecb5b37 
 ipa-server-dns >= 4.9.2-3.module+el8.4.0+10412+5ecb5b37 
 ipa-server-trust-ad >= 4.9.2-3.module+el8.4.0+10412+5ecb5b37 
 opendnssec >= 2.1.7-1.module+el8.4.0+9007+5084bdd8 
 python3-custodia >= 0.6.0-3.module+el8.1.0+4098+f286395e 
 python3-ipaclient >= 4.9.2-3.module+el8.4.0+10412+5ecb5b37 
 python3-ipalib >= 4.9.2-3.module+el8.4.0+10412+5ecb5b37 
 python3-ipaserver >= 4.9.2-3.module+el8.4.0+10412+5ecb5b37 
 python3-ipatests >= 4.9.2-3.module+el8.4.0+10412+5ecb5b37 
 python3-jwcrypto >= 0.5.0-1.module+el8.1.0+4098+f286395e 
 python3-kdcproxy >= 0.4-5.module+el8.2.0+4691+a05b2456 
 python3-pyusb >= 1.0.0-9.module+el8.1.0+4098+f286395e 
 python3-qrcode >= 5.1-12.module+el8.1.0+4098+f286395e 
 python3-qrcode-core >= 5.1-12.module+el8.1.0+4098+f286395e 
 python3-yubico >= 1.3.2-9.module+el8.1.0+4098+f286395e 
 slapi-nis >= 0.56.6-2.module+el8.4.0+10615+2234cc2c 
 softhsm >= 2.6.0-5.module+el8.4.0+10227+076cd560 
 softhsm-devel >= 2.6.0-5.module+el8.4.0+10227+076cd560 
  |  Patchnames:  RHSA-2021:1983 | 
SUSE Timeline for this CVE
CVE page created: Mon May 17 14:18:01 2021
CVE page last modified: Mon Oct  6 19:28:16 2025