Gentoo Archives: gentoo-announce

From: "Joshua J. Berry" <condordes@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 200403-12 ] OpenLDAP DoS Vulnerability
Date: Wed, 31 Mar 2004 11:03:08
Message-Id: 200403310301.52211.condordes@gentoo.org
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
5 Gentoo Linux Security Advisory GLSA 200403-12
6 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
7 http://security.gentoo.org
8 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
9
10 Severity: Normal
11 Title: OpenLDAP DoS Vulnerability
12 Date: March 31, 2004
13 Bugs: #26728
14 ID: 200403-12
15
16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
17
18 Synopsis
19 ========
20
21 A failed password operation can cause the OpenLDAP slapd server, if it
22 is using the back-ldbm backend, to free memory that was never
23 allocated.
24
25 Background
26 ==========
27
28 OpenLDAP is a suite of LDAP-related application and development tools.
29 It includes slapd (the standalone LDAP server), slurpd (the standalone
30 LDAP replication server), and various LDAP libraries, utilities and
31 example clients.
32
33 Affected packages
34 =================
35
36 -------------------------------------------------------------------
37 Package / Vulnerable / Unaffected
38 -------------------------------------------------------------------
39 net-nds/openldap <= 2.1.12 >= 2.1.13
40
41 Description
42 ===========
43
44 A password extended operation (password EXOP) which fails will cause
45 the slapd server to free() an uninitialized pointer, possibly resulting
46 in a segfault. This only affects servers using the back-ldbm backend.
47
48 Such a crash is not guaranteed with every failed operation, however, it
49 is possible.
50
51 Impact
52 ======
53
54 An attacker (or indeed, a normal user) may crash the OpenLDAP server,
55 creating a Denial of Service condition.
56
57 Workaround
58 ==========
59
60 A workaround is not currently known for this issue. All users are
61 advised to upgrade to the latest version of the affected package.
62
63 Resolution
64 ==========
65
66 OpenLDAP users should upgrade to version 2.1.13 or later:
67
68 # emerge sync
69
70 # emerge -pv ">=net-nds/openldap-2.1.13"
71 # emerge ">=net-nds/openldap-2.1.13"
72
73 References
74 ==========
75
76 [ 1 ] http://www.openldap.org/its/index.cgi?findid=2390
77
78 Concerns?
79 =========
80
81 Security is a primary focus of Gentoo Linux and ensuring the
82 confidentiality and security of our users machines is of utmost
83 importance to us. Any security concerns should be addressed to
84 security@g.o or alternatively, you may file a bug at
85 http://bugs.gentoo.org.
86 -----BEGIN PGP SIGNATURE-----
87 Version: GnuPG v1.2.4 (GNU/Linux)
88
89 iD8DBQFAaqUeaIxeYlQMsxsRAk6/AJ45nDjCml2RAz/dB/MaM7NQh50QGwCfW65t
90 tt5AQyqvuyf3bzmkpAQe+4E=
91 =n50g
92 -----END PGP SIGNATURE-----