The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.
The product does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Openldap | Openldap | 2.4.22 (including) | 2.4.22 (including) |
Red Hat Enterprise Linux 4 | RedHat | openldap-0:2.2.13-12.el4_8.3 | * |
Red Hat Enterprise Linux 5 | RedHat | openldap-0:2.3.43-12.el5_5.1 | * |
Openldap | Ubuntu | devel | * |
Openldap | Ubuntu | jaunty | * |
Openldap | Ubuntu | karmic | * |
Openldap | Ubuntu | lucid | * |
Openldap | Ubuntu | upstream | * |
Openldap2.2 | Ubuntu | dapper | * |
Openldap2.3 | Ubuntu | hardy | * |