blob: 1171ed6d600e74951a85c42134336ce32acdb188 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200403-12">
<title>OpenLDAP DoS Vulnerability</title>
A failed password operation can cause the OpenLDAP slapd server, if it is
using the back-ldbm backend, to free memory that was never allocated.
<product type="ebuild">openldap</product>
<announced>March 31, 2004</announced>
<revised>May 22, 2006: 02</revised>
<package name="net-nds/openldap" auto="yes" arch="*">
<unaffected range="ge">2.1.13</unaffected>
<vulnerable range="le">2.1.12</vulnerable>
OpenLDAP is a suite of LDAP-related application and development tools.
It includes slapd (the standalone LDAP server), slurpd (the standalone
LDAP replication server), and various LDAP libraries, utilities and
example clients.
A password extended operation (password EXOP) which fails will cause
the slapd server to free() an uninitialized pointer, possibly resulting
in a segfault. This only affects servers using the back-ldbm backend.
Such a crash is not guaranteed with every failed operation, however, it
is possible.
<impact type="normal">
An attacker (or indeed, a normal user) may crash the OpenLDAP server,
creating a Denial of Service condition.
A workaround is not currently known for this issue. All users are
advised to upgrade to the latest version of the affected package.
OpenLDAP users should upgrade to version 2.1.13 or later:
# emerge sync
# emerge -pv &quot;&gt;=net-nds/openldap-2.1.13&quot;
# emerge &quot;&gt;=net-nds/openldap-2.1.13&quot;</code>
<uri link="">OpenLDAP ITS Bug and Patch</uri>
<uri link="">CVE-2003-1201</uri>
<metadata tag="submitter" timestamp="Mon, 22 May 2006 05:51:37 +0000">