CVE-2010-0212
Publication date 28 July 2010
Last updated 24 July 2024
Ubuntu priority
OpenLDAP 2.4.22 allows remote attackers to cause a denial of service (crash) via a modrdn call with a zero-length RDN destination string, which is not properly handled by the smr_normalize function and triggers a NULL pointer dereference in the IA5StringNormalize function in schema_init.c, as demonstrated using the Codenomicon LDAPv3 test suite.
Status
Package | Ubuntu Release | Status |
---|---|---|
openldap | 10.04 LTS lucid |
Fixed 2.4.21-0ubuntu5.2
|
9.10 karmic |
Fixed 2.4.18-0ubuntu1.1
|
|
9.04 jaunty |
Fixed 2.4.15-1ubuntu3.1
|
|
8.04 LTS hardy | Not in release | |
6.06 LTS dapper | Not in release | |
openldap2.2 | 10.04 LTS lucid | Not in release |
9.10 karmic | Not in release | |
9.04 jaunty | Not in release | |
8.04 LTS hardy | Not in release | |
6.06 LTS dapper |
Fixed 2.2.26-5ubuntu2.10
|
|
openldap2.3 | 10.04 LTS lucid | Not in release |
9.10 karmic | Not in release | |
9.04 jaunty | Not in release | |
8.04 LTS hardy |
Fixed 2.4.9-0ubuntu0.8.04.4
|
|
6.06 LTS dapper | Not in release |
Patch details
Package | Patch details |
---|---|
openldap |