Source |
The Hacker News |
Identifiant |
8633030 |
Date de publication |
2025-01-03 13:46:00 (vue: 2025-01-03 09:08:03) |
Titre |
LDAPNightmare PoC Exploit Crashes LSASS and Reboots Windows Domain Controllers |
Texte |
A proof-of-concept (PoC) exploit has been released for a now-patched security flaw impacting Windows Lightweight Directory Access Protocol (LDAP) that could trigger a denial-of-service (DoS) condition.
The out-of-bounds reads vulnerability is tracked as CVE-2024-49113 (CVSS score: 7.5). It was addressed by Microsoft as part of Patch Tuesday updates for December 2024, alongside CVE-2024-49112 (
A proof-of-concept (PoC) exploit has been released for a now-patched security flaw impacting Windows Lightweight Directory Access Protocol (LDAP) that could trigger a denial-of-service (DoS) condition.
The out-of-bounds reads vulnerability is tracked as CVE-2024-49113 (CVSS score: 7.5). It was addressed by Microsoft as part of Patch Tuesday updates for December 2024, alongside CVE-2024-49112 ( |
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
2024 49112 49113 access addressed alongside been bounds concept condition controllers could crashes cve cvss december denial directory domain dos exploit flaw has impacting ldap ldapnightmare lightweight lsass microsoft now out part patch patched poc proof protocol reads reboots released score: security service tracked trigger tuesday updates vulnerability windows |
Tags |
Vulnerability
Threat
|
Stories |
|
Move |
|