Mandriva Linux Security Advisory : openldap (MDVSA-2010:142)

Medium Nessus Plugin ID 48200


The remote Mandriva Linux host is missing one or more security updates.


Multiple vulnerabilities has been discovered and corrected in openldap :

The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite (CVE-2010-0211).

OpenLDAP 2.4.22 allows remote attackers to cause a denial of service (crash) via a modrdn call with a zero-length RDN destination string, which is not properly handled by the smr_normalize function and triggers a NULL pointer dereference in the IA5StringNormalize function in schema_init.c, as demonstrated using the Codenomicon LDAPv3 test suite (CVE-2010-0212).

Packages for 2008.0 and 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: 90

The updated packages have been patched to correct these issues.


Update the affected packages.

Plugin Details

Severity: Medium

ID: 48200

File Name: mandriva_MDVSA-2010-142.nasl

Version: $Revision: 1.8 $

Type: local

Published: 2010/07/30

Modified: 2013/06/01

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64ldap2.3_0, p-cpe:/a:mandriva:linux:lib64ldap2.3_0-devel, p-cpe:/a:mandriva:linux:lib64ldap2.3_0-static-devel, p-cpe:/a:mandriva:linux:lib64ldap2.4_2, p-cpe:/a:mandriva:linux:lib64ldap2.4_2-devel, p-cpe:/a:mandriva:linux:lib64ldap2.4_2-static-devel, p-cpe:/a:mandriva:linux:libldap2.3_0, p-cpe:/a:mandriva:linux:libldap2.3_0-devel, p-cpe:/a:mandriva:linux:libldap2.3_0-static-devel, p-cpe:/a:mandriva:linux:libldap2.4_2, p-cpe:/a:mandriva:linux:libldap2.4_2-devel, p-cpe:/a:mandriva:linux:libldap2.4_2-static-devel, p-cpe:/a:mandriva:linux:openldap, p-cpe:/a:mandriva:linux:openldap-clients, p-cpe:/a:mandriva:linux:openldap-doc, p-cpe:/a:mandriva:linux:openldap-servers, p-cpe:/a:mandriva:linux:openldap-testprogs, p-cpe:/a:mandriva:linux:openldap-tests, cpe:/o:mandriva:linux:2008.0, cpe:/o:mandriva:linux:2009.0, cpe:/o:mandriva:linux:2009.1, cpe:/o:mandriva:linux:2010.0, cpe:/o:mandriva:linux:2010.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/07/28

Exploitable With

Core Impact

Reference Information

CVE: CVE-2010-0211, CVE-2010-0212

BID: 41770

MDVSA: 2010:142