[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2010:142 -- Mandriva openldap

ID: oval:org.secpod.oval:def:300229Date: (C)2012-01-07   (M)2024-02-19
Class: PATCHFamily: unix




Multiple vulnerabilities has been discovered and corrected in openldap: The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite . OpenLDAP 2.4.22 allows remote attackers to cause a denial of service via a modrdn call with a zero-length RDN destination string, which is not properly handled by the smr_normalize function and triggers a NULL pointer dereference in the IA5StringNormalize function in schema_init.c, as demonstrated using the Codenomicon LDAPv3 test suite . Packages for 2008.0 and 2009.0 are provided as of the Extended Maintenance Program

Platform:
Mandriva Linux 2010.0
Mandriva Linux 2010.1
Mandriva Linux 2009.0
Mandriva Linux 2009.1
Mandriva Linux 2008.0
Product:
openldap
Reference:
MDVSA-2010:142
CVE-2010-0212
CVE-2010-0211
CVE    2
CVE-2010-0211
CVE-2010-0212
CPE    5
cpe:/o:mandriva:linux:2009.0
cpe:/o:mandriva:linux:2008.0
cpe:/o:mandriva:linux:2009.1
cpe:/o:mandriva:linux:2010.1
...

© SecPod Technologies