{"id":"UBUNTU-CVE-2013-4449","details":"The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.","modified":"2026-01-30T00:30:32.444253Z","published":"2014-02-05T00:00:00Z","related":["USN-2622-1"],"upstream":["CVE-2013-4449"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2013-4449"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2622-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2013-4449"}],"affected":[{"package":{"name":"openldap","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/openldap@2.4.31-1+nmu2ubuntu8.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.31-1+nmu2ubuntu8.1"}]}],"versions":["2.4.31-1+nmu2ubuntu3","2.4.31-1+nmu2ubuntu4","2.4.31-1+nmu2ubuntu5","2.4.31-1+nmu2ubuntu8"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"2.4.31-1+nmu2ubuntu8.1","binary_name":"ldap-utils"},{"binary_version":"2.4.31-1+nmu2ubuntu8.1","binary_name":"libldap-2.4-2"},{"binary_version":"2.4.31-1+nmu2ubuntu8.1","binary_name":"libldap2-dev"},{"binary_version":"2.4.31-1+nmu2ubuntu8.1","binary_name":"slapd"},{"binary_version":"2.4.31-1+nmu2ubuntu8.1","binary_name":"slapd-smbk5pwd"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2013/UBUNTU-CVE-2013-4449.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"low"}]}