Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2011-4079

Publication date 27 October 2011

Last updated 24 July 2024


Ubuntu priority

Off-by-one error in the UTF8StringNormalize function in OpenLDAP 2.4.26 and earlier allows remote attackers to cause a denial of service (slapd crash) via a zero-length string that triggers a heap-based buffer overflow, as demonstrated using an empty postalAddressAttribute value in an LDIF entry.

Read the notes from the security team

Status

Package Ubuntu Release Status
openldap 11.10 oneiric
Fixed 2.4.25-1.1ubuntu4.1
11.04 natty
Fixed 2.4.23-6ubuntu6.1
10.10 maverick
Fixed 2.4.23-0ubuntu3.7
10.04 LTS lucid
Fixed 2.4.21-0ubuntu5.6
8.04 LTS hardy Not in release
openldap2.3 11.10 oneiric Not in release
11.04 natty Not in release
10.10 maverick Not in release
10.04 LTS lucid Not in release
8.04 LTS hardy
Not affected

Notes


tyhicks

Per Red Hat, this may not be exploitable due to properties of the memory allocator.


jdstrand

patch requires http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=patch;h=d0dd8616f1c68a868afeb8c2c5c09969e366e2c0 while bug exists since 2003, postalAddressValidate() is only function that could pass a 0-length string, and this is not present in 8.04 LTS. while RedHat claims heap implementation makes this not exploitable, will patch Ubuntu 10.04 and higher just in case the evaluation is incorrect.

References

Related Ubuntu Security Notices (USN)

    • USN-1266-1
    • OpenLDAP vulnerability
    • 17 November 2011

Other references