CVE-2025-61912
BaseFortify
Publication date: 2025-10-10
Last updated on: 2025-12-04
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| python-ldap | python-ldap | From 3.13.1 (inc) to 3.13.11 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-170 | The product does not terminate or incorrectly terminates a string or array with a null character or equivalent terminator. |
| CWE-116 | The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the python-ldap library versions prior to 3.4.5. The function ldap.dn.escape_dn_chars() incorrectly escapes the null byte (\x00) by emitting a backslash followed by a literal NUL byte instead of the correct RFC-4514 hex form \00. This improper escaping can cause applications that use this function to construct distinguished names (DNs) from untrusted input to fail consistently before sending requests to the LDAP server, resulting in a client-side denial of service.
How can this vulnerability impact me? :
If your application uses python-ldap versions prior to 3.4.5 and relies on ldap.dn.escape_dn_chars() to construct DNs from untrusted input, this vulnerability can cause your application to fail consistently before sending LDAP requests. This results in a client-side denial of service, potentially disrupting application functionality that depends on LDAP operations.
What immediate steps should I take to mitigate this vulnerability?
Upgrade python-ldap to version 3.4.5 or later, which contains a patch for the issue. Avoid using ldap.dn.escape_dn_chars() on untrusted input in versions prior to 3.4.5 to prevent client-side denial of service.