CVE Vulnerabilities

CVE-2010-0211

Unchecked Return Value

Published: Jul 28, 2010 | Modified: Jan 21, 2024
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
5 IMPORTANT
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V3
Ubuntu
MEDIUM

The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.

Weakness

The product does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions.

Affected Software

Name Vendor Start Version End Version
Openldap Openldap 2.4.22 (including) 2.4.22 (including)
Red Hat Enterprise Linux 4 RedHat openldap-0:2.2.13-12.el4_8.3 *
Red Hat Enterprise Linux 5 RedHat openldap-0:2.3.43-12.el5_5.1 *
Openldap Ubuntu devel *
Openldap Ubuntu jaunty *
Openldap Ubuntu karmic *
Openldap Ubuntu lucid *
Openldap Ubuntu upstream *
Openldap2.2 Ubuntu dapper *
Openldap2.3 Ubuntu hardy *

Potential Mitigations

References