DEBIAN-CVE-2015-0283

Source
https://security-tracker.debian.org/tracker/CVE-2015-0283
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2015-0283.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2015-0283
Upstream
Published
2015-03-30T14:59:00.070Z
Modified
2025-11-19T01:12:37.279729Z
Summary
[none]
Details

The slapi-nis plug-in before 0.54.2 does not properly reallocate memory when processing user accounts, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a request for a (1) group with a large number of members or (2) user that belongs to a large number of groups.

References

Affected packages

Debian:11 / slapi-nis

Package

Name
slapi-nis
Purl
pkg:deb/debian/slapi-nis?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.54.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2015-0283.json"

Debian:12 / slapi-nis

Package

Name
slapi-nis
Purl
pkg:deb/debian/slapi-nis?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.54.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2015-0283.json"

Debian:13 / slapi-nis

Package

Name
slapi-nis
Purl
pkg:deb/debian/slapi-nis?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.54.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2015-0283.json"