CVE-2011-4079
Publication date 27 October 2011
Last updated 24 July 2024
Ubuntu priority
Off-by-one error in the UTF8StringNormalize function in OpenLDAP 2.4.26 and earlier allows remote attackers to cause a denial of service (slapd crash) via a zero-length string that triggers a heap-based buffer overflow, as demonstrated using an empty postalAddressAttribute value in an LDIF entry.
Status
Package | Ubuntu Release | Status |
---|---|---|
openldap | ||
openldap2.3 | ||
Notes
tyhicks
Per Red Hat, this may not be exploitable due to properties of the memory allocator.
jdstrand
patch requires http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=patch;h=d0dd8616f1c68a868afeb8c2c5c09969e366e2c0 while bug exists since 2003, postalAddressValidate() is only function that could pass a 0-length string, and this is not present in 8.04 LTS. while RedHat claims heap implementation makes this not exploitable, will patch Ubuntu 10.04 and higher just in case the evaluation is incorrect.
Patch details
Package | Patch details |
---|---|
openldap |
References
Related Ubuntu Security Notices (USN)
- USN-1266-1
- OpenLDAP vulnerability
- 17 November 2011