Mandriva Linux Security Advisory : openldap (MDVSA-2011:055)

medium Nessus Plugin ID 53226

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Multiple vulnerabilities has been identified and fixed in openldap :

chain.c in back-ldap in OpenLDAP 2.4.x before 2.4.24, when a master-slave configuration with a chain overlay and ppolicy_forward_updates (aka authentication-failure forwarding) is used, allows remote authenticated users to bypass external-program authentication by sending an invalid password to a slave server (CVE-2011-1024).

modrdn.c in slapd in OpenLDAP 2.4.x before 2.4.24 allows remote attackers to cause a denial of service (daemon crash) via a relative Distinguished Name (DN) modification request (aka MODRDN operation) that contains an empty value for the OldDN field (CVE-2011-1081).

Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149 products_id=490

The updated packages have been patched to correct these issues.

Solution

Update the affected packages.

Plugin Details

Severity: Medium

ID: 53226

File Name: mandriva_MDVSA-2011-055.nasl

Version: 1.13

Type: local

Published: 3/31/2011

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64ldap2.4_2, p-cpe:/a:mandriva:linux:lib64ldap2.4_2-devel, p-cpe:/a:mandriva:linux:lib64ldap2.4_2-static-devel, p-cpe:/a:mandriva:linux:libldap2.4_2, p-cpe:/a:mandriva:linux:libldap2.4_2-devel, p-cpe:/a:mandriva:linux:libldap2.4_2-static-devel, p-cpe:/a:mandriva:linux:openldap, p-cpe:/a:mandriva:linux:openldap-clients, p-cpe:/a:mandriva:linux:openldap-doc, p-cpe:/a:mandriva:linux:openldap-servers, p-cpe:/a:mandriva:linux:openldap-testprogs, p-cpe:/a:mandriva:linux:openldap-tests, cpe:/o:mandriva:linux:2009.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/30/2011

Reference Information

CVE: CVE-2011-1024, CVE-2011-1081

BID: 46363, 46831

MDVSA: 2011:055