OpenLDAP 2.4.22 allows remote attackers to cause a denial of service (crash) via a modrdn call with a zero-length RDN destination string, which is not properly handled by the smr_normalize function and triggers a NULL pointer dereference in the IA5StringNormalize function in schema_init.c, as demonstrated using the Codenomicon LDAPv3 test suite.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Openldap | Openldap | 2.4.22 (including) | 2.4.22 (including) |
Openldap | Ubuntu | devel | * |
Openldap | Ubuntu | jaunty | * |
Openldap | Ubuntu | karmic | * |
Openldap | Ubuntu | lucid | * |
Openldap | Ubuntu | upstream | * |
Openldap2.2 | Ubuntu | dapper | * |
Openldap2.3 | Ubuntu | hardy | * |
Red Hat Enterprise Linux 5 | RedHat | openldap-0:2.3.43-12.el5_5.1 | * |