CVE-2010-0212

EUVD-2010-0243
OpenLDAP 2.4.22 allows remote attackers to cause a denial of service (crash) via a modrdn call with a zero-length RDN destination string, which is not properly handled by the smr_normalize function and triggers a NULL pointer dereference in the IA5StringNormalize function in schema_init.c, as demonstrated using the Codenomicon LDAPv3 test suite.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 98%
Affected Products (NVD)
VendorProductVersion
openldapopenldap
2.4.22
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openldap
bookworm
2.5.13+dfsg-5
fixed
bullseye
2.4.57+dfsg-3+deb11u1
fixed
bullseye (security)
2.4.57+dfsg-3+deb11u1
fixed
sid
2.5.18+dfsg-3
fixed
trixie
2.5.18+dfsg-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openldap
dapper
dne
hardy
dne
jaunty
Fixed 2.4.15-1ubuntu3.1
released
karmic
Fixed 2.4.18-0ubuntu1.1
released
lucid
Fixed 2.4.21-0ubuntu5.2
released
openldap2.2
dapper
Fixed 2.2.26-5ubuntu2.10
released
hardy
dne
jaunty
dne
karmic
dne
lucid
dne
openldap2.3
dapper
dne
hardy
Fixed 2.4.9-0ubuntu0.8.04.4
released
jaunty
dne
karmic
dne
lucid
dne
Common Weakness Enumeration
References