Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-0211

Опубликовано: 28 июл. 2010
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 5
CVSS3: 9.8

Описание

The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.

РелизСтатусПримечание
dapper

DNE

devel

released

2.4.23-0ubuntu1
hardy

DNE

jaunty

released

2.4.15-1ubuntu3.1
karmic

released

2.4.18-0ubuntu1.1
lucid

released

2.4.21-0ubuntu5.2
upstream

released

2.4.23

Показывать по

РелизСтатусПримечание
dapper

released

2.2.26-5ubuntu2.10
devel

DNE

hardy

DNE

jaunty

DNE

karmic

DNE

lucid

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

hardy

released

2.4.9-0ubuntu0.8.04.4
jaunty

DNE

karmic

DNE

lucid

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 97%
0.42633
Средний

5 Medium

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

redhat
почти 15 лет назад

The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.

CVSS3: 9.8
nvd
почти 15 лет назад

The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.

CVSS3: 9.8
debian
почти 15 лет назад

The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not ...

CVSS3: 9.8
github
около 3 лет назад

The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.

oracle-oval
почти 15 лет назад

ELSA-2010-0542: openldap security update (MODERATE)

EPSS

Процентиль: 97%
0.42633
Средний

5 Medium

CVSS2

9.8 Critical

CVSS3

Уязвимость CVE-2010-0211