
CVE-2011-1025 – openldap: rootpw not verified via slapd.conf when using the NDB backend
https://notcve.org/view.php?id=CVE-2011-1025
20 Mar 2011 — bind.cpp in back-ndb in OpenLDAP 2.4.x before 2.4.24 does not require authentication for the root Distinguished Name (DN), which allows remote attackers to bypass intended access restrictions via an arbitrary password. bind.cpp en back-ndb en OpenLDAP v2.4.x anteriores a v2.4.24 no requiere autenticación para el Distinguished Name (DN), lo que permite a atacantes remotos evitar las restricciones de acceso previsto a través de una contraseña arbitraria. Multiple vulnerabilities were found in OpenLDAP, allowi... • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 • CWE-287: Improper Authentication •

CVE-2011-1081 – OpenLDAP 2.4.x - 'modrdn' NULL OldDN Remote Denial of Service
https://notcve.org/view.php?id=CVE-2011-1081
20 Mar 2011 — modrdn.c in slapd in OpenLDAP 2.4.x before 2.4.24 allows remote attackers to cause a denial of service (daemon crash) via a relative Distinguished Name (DN) modification request (aka MODRDN operation) that contains an empty value for the OldDN field. modrdn.c en slapd en OpenLDAP v2.4.x anterior a v2.4.24 permite a atacantes remotos provocar una denegación de servicio (caída de demonio) mediante una petición de modificación del nombre completo relativo (DN) (también conocido como operación MODRDN) que conti... • https://www.exploit-db.com/exploits/35445 • CWE-399: Resource Management Errors •

CVE-2010-0212 – openldap: modrdn processing IA5StringNormalize NULL pointer dereference
https://notcve.org/view.php?id=CVE-2010-0212
27 Jul 2010 — OpenLDAP 2.4.22 allows remote attackers to cause a denial of service (crash) via a modrdn call with a zero-length RDN destination string, which is not properly handled by the smr_normalize function and triggers a NULL pointer dereference in the IA5StringNormalize function in schema_init.c, as demonstrated using the Codenomicon LDAPv3 test suite. OpenLDAP 2.4.22 permite a atacantes remotos provocar una denegación de servicio(caída) a través de una llamada modrdn con una cadena de destino RDN con longitud cer... • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 • CWE-264: Permissions, Privileges, and Access Controls CWE-476: NULL Pointer Dereference •

CVE-2010-0211 – OpenLDAP 2.4.22 - 'modrdn' Multiple Vulnerabilities
https://notcve.org/view.php?id=CVE-2010-0211
27 Jul 2010 — The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite. La función slap_modrdn2mods en modrdn.c e... • https://www.exploit-db.com/exploits/34348 • CWE-252: Unchecked Return Value •