Some vulnerabilities have been reported in OpenLDAP, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service).
1) An error in the "back-ldap" component when a slave server forwards password failures to a master server can be exploited to successfully authenticate with an invalid password.
Successful exploitation of this vulnerability requires a master and slave configuration with the "ppolicy_forward_updates" option.
2) An error in the "back-ndb" component when handling authentication for a "rootdn" Distinguished Name (DN) can be exploited to perform arbitrary actions (e.g. searching or updating) without a valid password.
Successful exploitation of this vulnerability requires knowing the "rootdn" value as configured in the slapd.conf file.
3) An error exists within the handling of certain MODRDN requests, which can be exploited to cause a crash by submitting specially crafted MODRDN requests.
The vulnerabilities are reported in versions prior to 2.4.24.
Solution: Update to version 2.4.24.
Provided and/or discovered by: Reported by:
1) Chris Jacobs to the mailing list.
2) George Tzanetis in a bug report.
3) Serge Dubrouski
Original Advisory: 1) http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6607
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: OpenLDAP Multiple Vulnerabilities
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.