CVE-2010-0211

EUVD-2010-0242
The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 97%
Affected Products (NVD)
VendorProductVersion
openldapopenldap
2.4.22
vmwareesxi
4.0
vmwareesxi
4.1
opensuseopensuse
11.0
applemac_os_x
10.6.0 ≤
𝑥
< 10.6.5
applemac_os_x_server
10.6.0 ≤
𝑥
< 10.6.5
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openldap
bookworm
2.5.13+dfsg-5
fixed
bullseye
2.4.57+dfsg-3+deb11u1
fixed
bullseye (security)
2.4.57+dfsg-3+deb11u1
fixed
sid
2.5.18+dfsg-3
fixed
trixie
2.5.18+dfsg-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openldap
dapper
dne
hardy
dne
jaunty
Fixed 2.4.15-1ubuntu3.1
released
karmic
Fixed 2.4.18-0ubuntu1.1
released
lucid
Fixed 2.4.21-0ubuntu5.2
released
openldap2.2
dapper
Fixed 2.2.26-5ubuntu2.10
released
hardy
dne
jaunty
dne
karmic
dne
lucid
dne
openldap2.3
dapper
dne
hardy
Fixed 2.4.9-0ubuntu0.8.04.4
released
jaunty
dne
karmic
dne
lucid
dne
References