First published: Tue Oct 15 2013(Updated: )
It was discovered that OpenLDAP, with the rwm overlay to slapd, could segfault if a user were able to query the directory and immediately unbind from the server. This seems to be due to the rwm overlay not doing reference counting properly, so rwm_conn_destroy frees the session context while rwm_op_search is using it. This condition also seems to require multiple cores/CPUs to trigger. This was also reported upstream [1] and is currently unfixed. [1] <a href="http://www.openldap.org/its/index.cgi/Incoming?id=7723">http://www.openldap.org/its/index.cgi/Incoming?id=7723</a>
Affected Software | Affected Version | How to fix |
---|---|---|
OpenLDAP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1019490 is considered moderate due to the potential for denial of service through a segmentation fault.
Fixing REDHAT-BUG-1019490 involves updating OpenLDAP to the latest patched version that addresses the reference counting issue.
REDHAT-BUG-1019490 affects versions of OpenLDAP that implement the rwm overlay to slapd.
The issue in REDHAT-BUG-1019490 is caused by improper reference counting in the rwm overlay, leading to a segmentation fault when a client unbinds immediately after querying.
Yes, REDHAT-BUG-1019490 can potentially be exploited remotely if an attacker can query the OpenLDAP server and then unbind quickly.