First published: Tue Dec 17 2002(Updated: )
Multiple buffer overflows in OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allow remote attackers to execute arbitrary code via (1) long -t or -r parameters to slurpd, (2) a malicious ldapfilter.conf file that is not properly handled by getfilter functions, (3) a malicious ldaptemplates.conf that causes an overflow in libldap, (4) a certain access control list that causes an overflow in slapd, or (5) a long generated filename for logging rejected replication requests.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenLDAP | <=2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1378 is considered critical due to the potential for remote code execution.
To fix CVE-2002-1378, upgrade to OpenLDAP version 2.2.1 or later.
OpenLDAP versions 2.2.0 and earlier are affected by CVE-2002-1378.
CVE-2002-1378 is a buffer overflow vulnerability that can be exploited for arbitrary code execution.
Yes, CVE-2002-1378 can be exploited by remote attackers through specific parameters and configuration files.