CVE-2010-0211
Publication date 28 July 2010
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.
Status
Package | Ubuntu Release | Status |
---|---|---|
openldap | 10.04 LTS lucid |
Fixed 2.4.21-0ubuntu5.2
|
9.10 karmic |
Fixed 2.4.18-0ubuntu1.1
|
|
9.04 jaunty |
Fixed 2.4.15-1ubuntu3.1
|
|
8.04 LTS hardy | Not in release | |
6.06 LTS dapper | Not in release | |
openldap2.2 | 10.04 LTS lucid | Not in release |
9.10 karmic | Not in release | |
9.04 jaunty | Not in release | |
8.04 LTS hardy | Not in release | |
6.06 LTS dapper |
Fixed 2.2.26-5ubuntu2.10
|
|
openldap2.3 | 10.04 LTS lucid | Not in release |
9.10 karmic | Not in release | |
9.04 jaunty | Not in release | |
8.04 LTS hardy |
Fixed 2.4.9-0ubuntu0.8.04.4
|
|
6.06 LTS dapper | Not in release |
Patch details
Package | Patch details |
---|---|
openldap |
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |