PT-2024-9433 · Microsoft · Windows Lightweight Directory Access Protocol+1

Yuki Chen

·

Published

2024-12-10

·

Updated

2025-07-15

·

CVE-2024-49113

CVSS v2.0

7.8

High

AV:N/AC:L/Au:N/C:N/I:N/A:C
Name of the Vulnerable Software and Affected Versions Windows Lightweight Directory Access Protocol (LDAP) (affected versions not specified)
Description The issue is related to a denial-of-service vulnerability in Windows Lightweight Directory Access Protocol (LDAP). This vulnerability can cause the Windows server to crash, leading to potential service disruptions. A proof-of-concept exploit has been released, demonstrating the risk. Additionally, a fake proof-of-concept exploit is being used to spread information-stealing malware, targeting security researchers. The vulnerability can be exploited by sending a specially crafted CLDAP referral response packet, causing the LSASS to crash and force a reboot. It is estimated that over 302 million services are potentially affected.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

DoS

Out of bounds Read

Weakness Enumeration

Related Identifiers

BDU:2024-11128
CVE-2024-49113

Affected Products

Windows
Windows Lightweight Directory Access Protocol