First published: Wed Oct 26 2011(Updated: )
A bug in slapd's UTF8StringNormalize() function can cause a one-byte buffer overflow when it is passed a zero-length string. The code then writes a '\0' past the one-byte long buffer allocated on the heap, which could possibly allow a remote authenticated user to crash slapd. As per the upstream report [1], this bug has been present since 2003-04-07 [2] so should affect all versions of openldap we currently ship. A patch to correct the flaw has been committed [3] (depends on the previous patch [4]). [1] <a href="http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7059;selectid=7059">http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7059;selectid=7059</a> [2] <a href="http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commitdiff;h=67d6b23d">http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commitdiff;h=67d6b23d</a> [3] <a href="http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commitdiff;h=507238713b71208ec4f262f312cb495a302df9e9">http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commitdiff;h=507238713b71208ec4f262f312cb495a302df9e9</a> [4] <a href="http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commitdiff;h=d0dd8616f1c68a868afeb8c2c5c09969e366e2c0">http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commitdiff;h=d0dd8616f1c68a868afeb8c2c5c09969e366e2c0</a>
Affected Software | Affected Version | How to fix |
---|---|---|
OpenLDAP | <2003-04-07 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-749324 is considered to be high due to its potential to cause a crash in the slapd service.
To fix REDHAT-BUG-749324, apply the latest patches or updates available for OpenLDAP that address this buffer overflow issue.
Users of OpenLDAP versions prior to 2003-04-07 are particularly affected by REDHAT-BUG-749324.
Yes, REDHAT-BUG-749324 can potentially be exploited by a remote authenticated user to crash the slapd service.
The slapd service within OpenLDAP is impacted by the buffer overflow vulnerability described in REDHAT-BUG-749324.