First published: Tue Jul 27 2010(Updated: )
OpenLDAP 2.4.22 allows remote attackers to cause a denial of service (crash) via a modrdn call with a zero-length RDN destination string, which is not properly handled by the smr_normalize function and triggers a NULL pointer dereference in the IA5StringNormalize function in schema_init.c, as demonstrated using the Codenomicon LDAPv3 test suite.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenLDAP | =2.4.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0212 has a medium severity rating as it can lead to denial of service due to a crash.
To fix CVE-2010-0212, upgrade to a patched version of OpenLDAP above 2.4.22.
CVE-2010-0212 affects OpenLDAP version 2.4.22, allowing possible remote attacks.
Yes, CVE-2010-0212 can be exploited remotely via a crafted modrdn call.
The impact of CVE-2010-0212 is a denial of service which may cause the OpenLDAP server to crash.