CVE-2010-0211
OpenLDAP 2.4.22 - 'modrdn' Multiple Vulnerabilities
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
3Exploited in Wild
-Decision
Descriptions
The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.
La función slap_modrdn2mods en modrdn.c en OpenLDAP v2.4.22 no comprueba el valor de retorno de la llamada a la función smr_normalize, lo que permite a atacantes remotos provocar una denegación de servicio (fallo de segmentación) y posiblemente ejecución de comandos de su elección a través de una llamada a modrdn call con una cadena RDN que contenga secuencias UTF-8 inválidas, lo que provocará la liberación de un puntero no válido ni inicializado en la función slap_mods_free, como se demostró usando la suite de test Codenomicon LDAPv3.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2010-01-06 CVE Reserved
- 2010-07-19 First Exploit
- 2010-07-27 CVE Published
- 2024-08-07 CVE Updated
- 2024-10-29 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-252: Unchecked Return Value
CAPEC
References (22)
URL | Tag | Source |
---|---|---|
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 | Third Party Advisory | |
http://secunia.com/advisories/42787 | Broken Link | |
http://support.apple.com/kb/HT4435 | Issue Tracking | |
http://www.securityfocus.com/archive/1/515545/100/0/threaded | Broken Link | |
http://www.securitytracker.com/id?1024221 | Broken Link | |
http://www.vmware.com/security/advisories/VMSA-2011-0001.html | Third Party Advisory | |
http://www.vupen.com/english/advisories/2011/0025 | Broken Link |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/34348 | 2010-07-19 | |
http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6570 | 2024-08-07 | |
http://www.securityfocus.com/bid/41770 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html | 2024-01-21 | |
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html | 2024-01-21 | |
http://secunia.com/advisories/40639 | 2024-01-21 | |
http://secunia.com/advisories/40677 | 2024-01-21 | |
http://secunia.com/advisories/40687 | 2024-01-21 | |
http://security.gentoo.org/glsa/glsa-201406-36.xml | 2024-01-21 | |
http://www.redhat.com/support/errata/RHSA-2010-0542.html | 2024-01-21 | |
http://www.redhat.com/support/errata/RHSA-2010-0543.html | 2024-01-21 | |
http://www.vupen.com/english/advisories/2010/1849 | 2024-01-21 | |
http://www.vupen.com/english/advisories/2010/1858 | 2024-01-21 | |
https://access.redhat.com/security/cve/CVE-2010-0211 | 2010-07-20 | |
https://bugzilla.redhat.com/show_bug.cgi?id=605448 | 2010-07-20 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Openldap Search vendor "Openldap" | Openldap Search vendor "Openldap" for product "Openldap" | 2.4.22 Search vendor "Openldap" for product "Openldap" and version "2.4.22" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Esxi Search vendor "Vmware" for product "Esxi" | 4.0 Search vendor "Vmware" for product "Esxi" and version "4.0" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Esxi Search vendor "Vmware" for product "Esxi" | 4.1 Search vendor "Vmware" for product "Esxi" and version "4.1" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Opensuse Search vendor "Opensuse" for product "Opensuse" | 11.0 Search vendor "Opensuse" for product "Opensuse" and version "11.0" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | >= 10.6.0 < 10.6.5 Search vendor "Apple" for product "Mac Os X" and version " >= 10.6.0 < 10.6.5" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Server Search vendor "Apple" for product "Mac Os X Server" | >= 10.6.0 < 10.6.5 Search vendor "Apple" for product "Mac Os X Server" and version " >= 10.6.0 < 10.6.5" | - |
Affected
|