CVE-2010-0211

The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openldap:openldap:2.4.22:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2010-07-28 12:48

Updated : 2024-01-21 01:35


NVD link : CVE-2010-0211

Mitre link : CVE-2010-0211

CVE.ORG link : CVE-2010-0211


JSON object : View

Products Affected

apple

  • mac_os_x
  • mac_os_x_server

openldap

  • openldap

opensuse

  • opensuse

vmware

  • esxi
CWE
CWE-252

Unchecked Return Value