CVE-2010-0212

OpenLDAP 2.4.22 allows remote attackers to cause a denial of service (crash) via a modrdn call with a zero-length RDN destination string, which is not properly handled by the smr_normalize function and triggers a NULL pointer dereference in the IA5StringNormalize function in schema_init.c, as demonstrated using the Codenomicon LDAPv3 test suite.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
certccCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 98%
VendorProductVersion
openldapopenldap
2.4.22
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openldap
bullseye (security)
2.4.57+dfsg-3+deb11u1
fixed
bullseye
2.4.57+dfsg-3+deb11u1
fixed
bookworm
2.5.13+dfsg-5
fixed
sid
2.5.18+dfsg-3
fixed
trixie
2.5.18+dfsg-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openldap
lucid
Fixed 2.4.21-0ubuntu5.2
released
karmic
Fixed 2.4.18-0ubuntu1.1
released
jaunty
Fixed 2.4.15-1ubuntu3.1
released
hardy
dne
dapper
dne
openldap2.2
lucid
dne
karmic
dne
jaunty
dne
hardy
dne
dapper
Fixed 2.2.26-5ubuntu2.10
released
openldap2.3
lucid
dne
karmic
dne
jaunty
dne
hardy
Fixed 2.4.9-0ubuntu0.8.04.4
released
dapper
dne
Common Weakness Enumeration
References