CVE-2023-21557
EUVD-2023-2572410.01.2023, 22:15
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service VulnerabilityEnginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| microsoft | windows_10_1607 | - |
| microsoft | windows_10_1607 | - |
| microsoft | windows_10_1809 | - |
| microsoft | windows_10_1809 | - |
| microsoft | windows_10_1809 | - |
| microsoft | windows_10_20h2 | - |
| microsoft | windows_10_20h2 | - |
| microsoft | windows_10_20h2 | - |
| microsoft | windows_10_21h2 | - |
| microsoft | windows_10_21h2 | - |
| microsoft | windows_10_21h2 | - |
| microsoft | windows_10_22h2 | - |
| microsoft | windows_10_22h2 | - |
| microsoft | windows_10_22h2 | - |
| microsoft | windows_11_21h2 | - |
| microsoft | windows_11_21h2 | - |
| microsoft | windows_11_22h2 | - |
| microsoft | windows_11_22h2 | - |
| microsoft | windows_7 | - |
| microsoft | windows_7 | - |
| microsoft | windows_8.1 | - |
| microsoft | windows_8.1 | - |
| microsoft | windows_rt_8.1 | - |
| microsoft | windows_server_2008 | - |
| microsoft | windows_server_2008 | - |
| microsoft | windows_server_2012 | - |
| microsoft | windows_server_2016 | - |
| microsoft | windows_server_2019 | - |
| microsoft | windows_server_2022 | - |
𝑥
= Vulnerable software versions
Windows Releases
Platform | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Windows 10 |
| ||||||||||||
| Windows 11 |
| ||||||||||||
| Windows 7 |
| ||||||||||||
| Windows 8.1 |
| ||||||||||||
| Windows RT 8.1 |
| ||||||||||||
| Windows Server 2008 |
| ||||||||||||
| Windows Server 2008 R2 |
| ||||||||||||
| Windows Server 2012 |
| ||||||||||||
| Windows Server 2012 R2 |
| ||||||||||||
| Windows Server 2016 |
| ||||||||||||
| Windows Server 2019 |
| ||||||||||||
| Windows Server 2022 |
|
Common Weakness Enumeration
- CWE-190 - Integer Overflow or WraparoundThe software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
- CWE-400 - Uncontrolled Resource ConsumptionThe software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.