USN-965-1: OpenLDAP vulnerabilities

9 August 2010

openldap, openldap2.2, openldap2.3 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 10.04 LTS
  • Ubuntu 9.10
  • Ubuntu 9.04
  • Ubuntu 8.04 LTS
  • Ubuntu 6.06 LTS

Summary

Software Description

  • openldap
  • openldap2.3
  • openldap2.2

Details

Using the Codenomicon LDAPv3 test suite, Ilkka Mattila and Tuomas Salomäki discovered that the slap_modrdn2mods function in modrdn.c in OpenLDAP does not check the return value from a call to the smr_normalize function. A remote attacker could use specially crafted modrdn requests to crash the slapd daemon or possibly execute arbitrary code. (CVE-2010-0211)

Using the Codenomicon LDAPv3 test suite, Ilkka Mattila and Tuomas Salomäki discovered that OpenLDAP does not properly handle empty RDN strings. A remote attacker could use specially crafted modrdn requests to crash the slapd daemon. (CVE-2010-0212)

In the default installation under Ubuntu 8.04 LTS and later, attackers would be isolated by the OpenLDAP AppArmor profile for the slapd daemon.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 10.04 LTS
slapd - 2.4.21-0ubuntu5.2
Ubuntu 9.10
slapd - 2.4.18-0ubuntu1.1
Ubuntu 9.04
slapd - 2.4.15-1ubuntu3.1
Ubuntu 8.04 LTS
slapd - 2.4.9-0ubuntu0.8.04.4
Ubuntu 6.06 LTS
slapd - 2.2.26-5ubuntu2.10

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References