Gravité: : Medium
  Identifiant(s) CVE: : CVE-2010-0211
  Date du conseil: 15 février 2011

  Description

 The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.

  Information Exposure Rating:

Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.

  Solutions

  Trend Micro Deep Security DPI Rule Number: 1004386
  Trend Micro Deep Security DPI Rule Name: 1004386 - OpenLDAP Modrdn RDN UTF-8 String Code Execution

  Affected software and version:

  • openldap openldap 2.4.22