The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published: 2010-07-27T22:00:00

Updated: 2024-08-07T00:37:54.224Z

Reserved: 2010-01-06T00:00:00

Link: CVE-2010-0211

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2010-07-28T12:48:51.620

Modified: 2024-11-21T01:11:46.037

Link: CVE-2010-0211

cve-icon Redhat

Severity : Important

Publid Date: 2010-07-19T00:00:00Z

Links: CVE-2010-0211 - Bugzilla