PT-2024-9433 · Microsoft · Windows Lightweight Directory Access Protocol+1
Yuki Chen
·
Published
2024-12-10
·
Updated
2025-07-15
·
CVE-2024-49113
CVSS v2.0
7.8
High
| AV:N/AC:L/Au:N/C:N/I:N/A:C |
Name of the Vulnerable Software and Affected Versions
Windows Lightweight Directory Access Protocol (LDAP) (affected versions not specified)
Description
The issue is related to a denial-of-service vulnerability in Windows Lightweight Directory Access Protocol (LDAP). This vulnerability can cause the Windows server to crash, leading to potential service disruptions. A proof-of-concept exploit has been released, demonstrating the risk. Additionally, a fake proof-of-concept exploit is being used to spread information-stealing malware, targeting security researchers. The vulnerability can be exploited by sending a specially crafted CLDAP referral response packet, causing the LSASS to crash and force a reboot. It is estimated that over 302 million services are potentially affected.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
DoS
Out of bounds Read
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Windows
Windows Lightweight Directory Access Protocol