The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.
2010-07-28T12:48:51.620
2025-04-11T00:51:21.963
Deferred
CVSSv3.1: 9.8 (CRITICAL)
AV:N/AC:L/Au:N/C:N/I:N/A:P
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | openldap | openldap | 2.4.22 | Yes |
Operating System | vmware | esxi | 4.0 | Yes |
Operating System | vmware | esxi | 4.1 | Yes |
Operating System | opensuse | opensuse | 11.0 | Yes |
Operating System | apple | mac_os_x | < 10.6.5 | Yes |
Operating System | apple | mac_os_x_server | < 10.6.5 | Yes |