7.6 High
AI Score
Confidence
High
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.965 High
EPSS
Percentile
99.6%
OpenLDAP 2.4.22 allows remote attackers to cause a denial of service (crash) via a modrdn call with a zero-length RDN destination string, which is not properly handled by the smr_normalize function and triggers a NULL pointer dereference in the IA5StringNormalize function in schema_init.c, as demonstrated using the Codenomicon LDAPv3 test suite.
CPE | Name | Operator | Version |
---|---|---|---|
openldap:openldap | openldap | eq | 2.4.22 |
kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
kb.juniper.net/InfoCenter/index?page=content&id=JSA10735
lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
secunia.com/advisories/40639
secunia.com/advisories/40687
secunia.com/advisories/42787
security.gentoo.org/glsa/glsa-201406-36.xml
support.apple.com/kb/HT4435
www.openldap.org/its/index.cgi/Software%20Bugs?id=6570
www.redhat.com/support/errata/RHSA-2010-0542.html
www.securityfocus.com/archive/1/515545/100/0/threaded
www.securityfocus.com/bid/41770
www.securitytracker.com/id?1024221
www.vmware.com/security/advisories/VMSA-2011-0001.html
www.vupen.com/english/advisories/2010/1849
www.vupen.com/english/advisories/2010/1858
www.vupen.com/english/advisories/2011/0025