OpenLDAP Modrdn RDN UTF-8 String Code Execution
Publish date: 15 de febrero de 2011
Gravedad: Medio
Identificadores de CVE : CVE-2010-0211
Fecha recomendada: 15 de febrero de 2011
Descripción
The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.
Revelación de la información
Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.
Soluciones
Trend Micro Deep Security DPI Rule Number: 1004386
Trend Micro Deep Security DPI Rule Name: 1004386 - OpenLDAP Modrdn RDN UTF-8 String Code Execution
Software y versión afectados
- openldap openldap 2.4.22