CVE-2010-0211

The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
certccCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 97%
VendorProductVersion
openldapopenldap
2.4.22
vmwareesxi
4.0
vmwareesxi
4.1
opensuseopensuse
11.0
applemac_os_x
10.6.0 ≤
𝑥
< 10.6.5
applemac_os_x_server
10.6.0 ≤
𝑥
< 10.6.5
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openldap
bullseye (security)
2.4.57+dfsg-3+deb11u1
fixed
bullseye
2.4.57+dfsg-3+deb11u1
fixed
bookworm
2.5.13+dfsg-5
fixed
sid
2.5.18+dfsg-3
fixed
trixie
2.5.18+dfsg-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openldap
lucid
Fixed 2.4.21-0ubuntu5.2
released
karmic
Fixed 2.4.18-0ubuntu1.1
released
jaunty
Fixed 2.4.15-1ubuntu3.1
released
hardy
dne
dapper
dne
openldap2.2
lucid
dne
karmic
dne
jaunty
dne
hardy
dne
dapper
Fixed 2.2.26-5ubuntu2.10
released
openldap2.3
lucid
dne
karmic
dne
jaunty
dne
hardy
Fixed 2.4.9-0ubuntu0.8.04.4
released
dapper
dne
References