The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2010-07-28 12:48
Updated : 2024-01-21 01:35
NVD link : CVE-2010-0211
Mitre link : CVE-2010-0211
CVE.ORG link : CVE-2010-0211
JSON object : View
Products Affected
apple
- mac_os_x
- mac_os_x_server
openldap
- openldap
opensuse
- opensuse
vmware
- esxi
CWE
CWE-252
Unchecked Return Value