OpenLDAP Modrdn RDN UTF-8 String Code Execution
Publish Date: 15 Februar 2011
Schweregrad:: Mittel
CVE Kennungen:: CVE-2010-0211
Hinweisdatum: 15 Februar 2011
Beschreibung
The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.
Trend Micro Lösungen
Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.
Lösungen
Trend Micro Deep Security DPI Rule Number: 1004386
Trend Micro Deep Security DPI Rule Name: 1004386 - OpenLDAP Modrdn RDN UTF-8 String Code Execution
Betroffene Software und Version:
- openldap openldap 2.4.22