Inefficient Regular Expression Complexity Affecting python-ldap package, versions <3.0.0-1ubuntu0.2


Severity

Recommended
0.0
medium
0
10

Based on Ubuntu security rating.

Threat Intelligence

EPSS
0.13% (48th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Inefficient Regular Expression Complexity vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UBUNTU1804-PYTHONLDAP-2932347
  • published20 Jun 2022
  • disclosed18 Jun 2022

Introduced: 18 Jun 2022

CVE-2021-46823  (opens in a new tab)
CWE-1333  (opens in a new tab)

How to fix?

Upgrade Ubuntu:18.04 python-ldap to version 3.0.0-1ubuntu0.2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python-ldap package and not the python-ldap package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

python-ldap before 3.4.0 is vulnerable to a denial of service when ldap.schema is used for untrusted schema definitions, because of a regular expression denial of service (ReDoS) flaw in the LDAP schema parser. By sending crafted regex input, a remote authenticated attacker could exploit this vulnerability to cause a denial of service condition.

CVSS Scores

version 3.1