5
CVSSv2

CVE-2010-0212

Published: 28/07/2010 Updated: 10/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

OpenLDAP 2.4.22 allows remote malicious users to cause a denial of service (crash) via a modrdn call with a zero-length RDN destination string, which is not properly handled by the smr_normalize function and triggers a NULL pointer dereference in the IA5StringNormalize function in schema_init.c, as demonstrated using the Codenomicon LDAPv3 test suite.

Vulnerable Product Search on Vulmon Subscribe to Product

openldap openldap 2.4.22

Vendor Advisories

Synopsis Moderate: openldap security update Type/Severity Security Advisory: Moderate Topic Updated openldap packages that fix multiple security issues are nowavailable for Red Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as having moderatesecurity impact Common Vulnerabi ...
Using the Codenomicon LDAPv3 test suite, Ilkka Mattila and Tuomas Salomäki discovered that the slap_modrdn2mods function in modrdnc in OpenLDAP does not check the return value from a call to the smr_normalize function A remote attacker could use specially crafted modrdn requests to crash the slapd daemon or possibly execute arbitrary code (CVE- ...
Two remote vulnerabilities have been discovered in OpenLDAP The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2010-0211 The slap_modrdn2mods function in modrdnc in OpenLDAP 2422 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a den ...