Description
The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2077-1 | New openldap packages fix potential code execution |
Ubuntu USN |
USN-965-1 | OpenLDAP vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-07T00:37:54.224Z
Reserved: 2010-01-06T00:00:00.000Z
Link: CVE-2010-0211
No data.
Status : Modified
Published: 2010-07-28T12:48:51.620
Modified: 2026-04-29T01:13:23.040
Link: CVE-2010-0211
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN