Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-0212

Опубликовано: 28 июл. 2010
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 5

Описание

OpenLDAP 2.4.22 allows remote attackers to cause a denial of service (crash) via a modrdn call with a zero-length RDN destination string, which is not properly handled by the smr_normalize function and triggers a NULL pointer dereference in the IA5StringNormalize function in schema_init.c, as demonstrated using the Codenomicon LDAPv3 test suite.

РелизСтатусПримечание
dapper

DNE

devel

released

2.4.23-0ubuntu1
hardy

DNE

jaunty

released

2.4.15-1ubuntu3.1
karmic

released

2.4.18-0ubuntu1.1
lucid

released

2.4.21-0ubuntu5.2
upstream

released

2.4.23

Показывать по

РелизСтатусПримечание
dapper

released

2.2.26-5ubuntu2.10
devel

DNE

hardy

DNE

jaunty

DNE

karmic

DNE

lucid

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

hardy

released

2.4.9-0ubuntu0.8.04.4
jaunty

DNE

karmic

DNE

lucid

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 98%
0.64006
Средний

5 Medium

CVSS2

Связанные уязвимости

redhat
почти 15 лет назад

OpenLDAP 2.4.22 allows remote attackers to cause a denial of service (crash) via a modrdn call with a zero-length RDN destination string, which is not properly handled by the smr_normalize function and triggers a NULL pointer dereference in the IA5StringNormalize function in schema_init.c, as demonstrated using the Codenomicon LDAPv3 test suite.

nvd
почти 15 лет назад

OpenLDAP 2.4.22 allows remote attackers to cause a denial of service (crash) via a modrdn call with a zero-length RDN destination string, which is not properly handled by the smr_normalize function and triggers a NULL pointer dereference in the IA5StringNormalize function in schema_init.c, as demonstrated using the Codenomicon LDAPv3 test suite.

debian
почти 15 лет назад

OpenLDAP 2.4.22 allows remote attackers to cause a denial of service ( ...

github
около 3 лет назад

OpenLDAP 2.4.22 allows remote attackers to cause a denial of service (crash) via a modrdn call with a zero-length RDN destination string, which is not properly handled by the smr_normalize function and triggers a NULL pointer dereference in the IA5StringNormalize function in schema_init.c, as demonstrated using the Codenomicon LDAPv3 test suite.

oracle-oval
почти 15 лет назад

ELSA-2010-0542: openldap security update (MODERATE)

EPSS

Процентиль: 98%
0.64006
Средний

5 Medium

CVSS2