Mandriva Linux Security Advisory : openldap (MDVSA-2010:142)

medium Nessus Plugin ID 48200

Language:

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Multiple vulnerabilities has been discovered and corrected in openldap :

The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite (CVE-2010-0211).

OpenLDAP 2.4.22 allows remote attackers to cause a denial of service (crash) via a modrdn call with a zero-length RDN destination string, which is not properly handled by the smr_normalize function and triggers a NULL pointer dereference in the IA5StringNormalize function in schema_init.c, as demonstrated using the Codenomicon LDAPv3 test suite (CVE-2010-0212).

Packages for 2008.0 and 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=4 90

The updated packages have been patched to correct these issues.

Solution

Update the affected packages.

Plugin Details

Severity: Medium

ID: 48200

File Name: mandriva_MDVSA-2010-142.nasl

Version: 1.11

Type: local

Published: 7/30/2010

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64ldap2.3_0, p-cpe:/a:mandriva:linux:lib64ldap2.3_0-devel, p-cpe:/a:mandriva:linux:lib64ldap2.3_0-static-devel, p-cpe:/a:mandriva:linux:lib64ldap2.4_2, p-cpe:/a:mandriva:linux:lib64ldap2.4_2-devel, p-cpe:/a:mandriva:linux:lib64ldap2.4_2-static-devel, p-cpe:/a:mandriva:linux:libldap2.3_0, p-cpe:/a:mandriva:linux:libldap2.3_0-devel, p-cpe:/a:mandriva:linux:libldap2.3_0-static-devel, p-cpe:/a:mandriva:linux:libldap2.4_2, p-cpe:/a:mandriva:linux:libldap2.4_2-devel, p-cpe:/a:mandriva:linux:libldap2.4_2-static-devel, p-cpe:/a:mandriva:linux:openldap, p-cpe:/a:mandriva:linux:openldap-clients, p-cpe:/a:mandriva:linux:openldap-doc, p-cpe:/a:mandriva:linux:openldap-servers, p-cpe:/a:mandriva:linux:openldap-testprogs, p-cpe:/a:mandriva:linux:openldap-tests, cpe:/o:mandriva:linux:2008.0, cpe:/o:mandriva:linux:2009.0, cpe:/o:mandriva:linux:2009.1, cpe:/o:mandriva:linux:2010.0, cpe:/o:mandriva:linux:2010.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/28/2010

Exploitable With

Core Impact

Reference Information

CVE: CVE-2010-0211, CVE-2010-0212

BID: 41770

MDVSA: 2010:142