CVE-2020-36227

7.5 HIGH

📋 TL;DR

This vulnerability in OpenLDAP allows attackers to trigger an infinite loop in the slapd daemon by sending a specially crafted cancel_extop Cancel operation, causing a denial of service. It affects OpenLDAP servers running vulnerable versions, potentially disrupting directory services.

💻 Affected Systems

Products:
  • OpenLDAP
Versions: All versions before 2.4.57
Operating Systems: All operating systems running OpenLDAP
Default Config Vulnerable: ⚠️ Yes
Notes: Affects slapd daemon when cancel_extop operation is enabled (default configuration).

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete unavailability of LDAP directory services, disrupting authentication, authorization, and other directory-dependent services across the organization.

🟠

Likely Case

Service disruption of OpenLDAP servers requiring restart, causing temporary authentication failures for users and applications.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring allowing quick detection and response.

🌐 Internet-Facing: HIGH - Internet-facing OpenLDAP servers are directly exposed to exploitation attempts.
🏢 Internal Only: MEDIUM - Internal servers are still vulnerable to internal threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending a malformed cancel_extop Cancel operation to the slapd daemon.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: OpenLDAP 2.4.57 and later

Vendor Advisory: https://bugs.openldap.org/show_bug.cgi?id=9428

Restart Required: Yes

Instructions:

1. Download OpenLDAP 2.4.57 or later from openldap.org. 2. Stop slapd service. 3. Install updated version. 4. Restart slapd service.

🔧 Temporary Workarounds

Disable cancel_extop operation

all

Remove or disable the cancel_extop operation in slapd configuration to prevent exploitation.

Edit slapd.conf or dynamic configuration to remove cancel_extop support

Network filtering

all

Block cancel_extop operations at network perimeter or load balancer.

Configure firewall/IPS to drop packets containing cancel_extop operations

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach OpenLDAP servers.
  • Deploy monitoring and alerting for slapd process crashes or high CPU usage.

🔍 How to Verify

Check if Vulnerable:

Check OpenLDAP version: slapd -V 2>&1 | grep 'OpenLDAP' and compare to 2.4.57.

Check Version:

slapd -V 2>&1 | grep 'OpenLDAP'

Verify Fix Applied:

Confirm version is 2.4.57 or later and test cancel_extop operations do not cause infinite loops.

📡 Detection & Monitoring

Log Indicators:

  • slapd process consuming 100% CPU
  • slapd crash logs
  • repeated cancel_extop operation attempts

Network Indicators:

  • Unusual volume of cancel_extop operations to LDAP ports

SIEM Query:

source="slapd.log" AND ("cancel_extop" OR "high cpu" OR "crash")

🔗 References

📤 Share & Export