Linux Security
Linux Security
Linux Security

Debian: DSA-2077-1: New openldap packages fix potential code execution

Date 29 Jul 2010
Posted By LinuxSecurity Advisories
Two remote vulnerabilities have been discovered in OpenLDAP. The Common Vulnerabilities and Exposures project identifies the following problems:
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-2077-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.                           Florian Weimer
July 29, 2010               
- ------------------------------------------------------------------------

Package        : openldap
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2010-0211 CVE-2010-0212

Two remote vulnerabilities have been discovered in OpenLDAP.  The
Common Vulnerabilities and Exposures project identifies the following


    The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does
    not check the return value of a call to the smr_normalize
    function, which allows remote attackers to cause a denial of
    service (segmentation fault) and possibly execute arbitrary code
    via a modrdn call with an RDN string containing invalid UTF-8


    OpenLDAP 2.4.22 allows remote attackers to cause a denial of
    service (crash) via a modrdn call with a zero-length RDN
    destination string.

For the stable distribution (lenny), this problem has been fixed in
version 2.4.11-1+lenny2.  (The missing update for the mips
architecture will be provided soon.)

For the unstable distribution (sid), this problem has been fixed in
version 2.4.23-1.

We recommend that you upgrade your openldap packages.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Source archives:
    Size/MD5 checksum:     1831 afe836285d70b3d51b50d06658b7cc22
    Size/MD5 checksum:  4193523 d4e8669e2c9b8d981e371e97e3cf92d9
    Size/MD5 checksum:   149276 e9668ba9648e3e1f306a97c6cc77d5a3

alpha architecture (DEC Alpha)
    Size/MD5 checksum:  1018392 d18b30dd684b7582ba3f5fda7c0ec52d
    Size/MD5 checksum:   284794 3d3094d356fa97396dd53701ff8177c1
    Size/MD5 checksum:  3625184 8c651f17c240c4222c26783e1333d7b4
    Size/MD5 checksum:   281172 d91f060a2e0e9b3f7651913228e33a45
    Size/MD5 checksum:   206338 7a268eec31460d56dfa4e51000a0f20e
    Size/MD5 checksum:  1534546 70ae45ec33481afbf305544bf9d70cb0

amd64 architecture (AMD x86_64 (AMD64))
    Size/MD5 checksum:   205426 c7fecb2287a970a5b06e1dd053413cf6
    Size/MD5 checksum:  3665336 a25a01da15aed085d7476043a69c9f43
    Size/MD5 checksum:   266508 be5e6b39fb89340139dbde19f09a6777
    Size/MD5 checksum:   972300 a73c35b4c7f48427a8fd5fe971c1aac4
    Size/MD5 checksum:   299624 b132ed70255863a64e1eb94a5700dbf0
    Size/MD5 checksum:  1509162 0e9758a242eb928e9c5287d2801f280b

arm architecture (ARM)
    Size/MD5 checksum:  1413404 2ff76be2a9be2109b995d2fbb89ba776
    Size/MD5 checksum:   248960 042b8f1642b8ea512ba4abdf8a60d2b3
    Size/MD5 checksum:  3576526 6c38ec7d7a9e3a35e043cdb4276b837c
    Size/MD5 checksum:   869398 5f75a2717d71579905ba1058d530ede0
    Size/MD5 checksum:   179976 b69cc3f9fd1f4f09eb015e28b60d3b3a
    Size/MD5 checksum:   279998 0534bb7fb3fc4eaf311bf846dfb3c800

armel architecture (ARM EABI)
    Size/MD5 checksum:   244982 09dc4f6dc96aab40b399b52cdd440f49
    Size/MD5 checksum:   281290 ed72c73b8018e02b579af7fc8652ad5a
    Size/MD5 checksum:   179660 3ca1f0b69016395df01441d2be719acb
    Size/MD5 checksum:   863030 4382d905de1db012e3197c1b4cbd53f9
    Size/MD5 checksum:  3583978 00372759861243bb13585f34bf93be4b
    Size/MD5 checksum:  1407120 b0fa8a6ea8d9b2305967c1f6486fa901

hppa architecture (HP PA RISC)
    Size/MD5 checksum:   998740 a675f6577888e4518b38fe32ed9c0954
    Size/MD5 checksum:  1532150 1eaf00efdb3f58b494466c6af919d27b
    Size/MD5 checksum:   264082 b88df4740a44865d431b292f0e029475
    Size/MD5 checksum:   284888 7ce39229438af13c8220edece4e9c856
    Size/MD5 checksum:  3621796 d4307c86696c24a200ac12a310885289
    Size/MD5 checksum:   201312 e826b1ca00ff0f50fb9472d5f28551f6

i386 architecture (Intel ia32)
    Size/MD5 checksum:  3562530 a1866b654c74dadd577d7a8322285553
    Size/MD5 checksum:   189038 039bf2208067cb5899a6c9ae6364a74d
    Size/MD5 checksum:   286894 0acddd599377272201cd6788a0f19bdc
    Size/MD5 checksum:   244480 d2ca1f47200257729bfde83e67526527
    Size/MD5 checksum:  1397792 3740fe46b91fa94690c5cb081b286041
    Size/MD5 checksum:   870436 f92b3b1928099d93ae35a98e9a75ac65

ia64 architecture (Intel ia64)
    Size/MD5 checksum:  1038332 2a23da950b3354b1027cb991ba2e9bd1
    Size/MD5 checksum:  2016204 54caa4d0966584b247bc4cffdac00d94
    Size/MD5 checksum:   269460 89ba522a4c15ac0dacb6537edf468bb9
    Size/MD5 checksum:   352176 383c904bee22aee1d94d238de24768e0
    Size/MD5 checksum:  3590732 49ac7b30b339381b7d01f9d86ac7e54f
    Size/MD5 checksum:   258836 36313ee33851fcc77c9a49bb340f30b2

mipsel architecture (MIPS (Little Endian))
    Size/MD5 checksum:  3641930 05338b1bcd1ae4a5d921023ce12baa24
    Size/MD5 checksum:  1388338 045112a49ef59f53286e6ff8dcf56f1c
    Size/MD5 checksum:   181222 e2fc86fb9b0e1ca335aa92bdd9ee8088
    Size/MD5 checksum:   261520 f4317c50476ed380b91546a81753483f
    Size/MD5 checksum:   296334 5c106ddb8aab107366077d8bf6c013e4
    Size/MD5 checksum:   846022 87238f27ad1428d0ae2b2555cc5831c7

powerpc architecture (PowerPC)
    Size/MD5 checksum:   295538 7193f88b4fc784f1bc49e16db44bc451
    Size/MD5 checksum:   199352 7cdb792324d09442a7029f768300a830
    Size/MD5 checksum:  1558086 d65f456faf9ac835725a86c3a0c13122
    Size/MD5 checksum:   981510 805f717025ed2e56d241e98987173012
    Size/MD5 checksum:  3721030 85d95b637bcd3de3527cb11554f54d8e
    Size/MD5 checksum:   284672 d49b7a5067b6671933194b849f2f5419

s390 architecture (IBM S/390)
    Size/MD5 checksum:  1045564 a9c32d3b14f6969228def0dab1f7209c
    Size/MD5 checksum:   298596 07c975378ad71d9d83ba951f71dc4140
    Size/MD5 checksum:   266258 d6bfe59a7514b370eea5380d30e4d5b2
    Size/MD5 checksum:  3700520 c032e0d5e2a209597a7c40e3c6aedfb0
    Size/MD5 checksum:  1497898 6b20aec732079628189c126595676d80
    Size/MD5 checksum:   204656 ded26b56657fd5db7686c8163aa9ac11

sparc architecture (Sun SPARC/UltraSPARC)
    Size/MD5 checksum:  1394762 207402a46ff26af86197ea981ea25ab8
    Size/MD5 checksum:   248828 013b1d3f070546d2524cbe4d49370810
    Size/MD5 checksum:   182914 4e271359df09ba43102089da55778d9a
    Size/MD5 checksum:   858646 e5e75c350ab491ad5a90413bc1de84df
    Size/MD5 checksum:   261014 37c7cc86a4ae1e84ad9e42b8a302a9e8
    Size/MD5 checksum:  3501616 2b2fc3cb381ccf9b10901e90999a7403

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
Package info: `apt-cache show ' and

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"43","type":"x","order":"1","pct":81.13,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"5","type":"x","order":"2","pct":9.43,"resources":[]},{"id":"181","title":"Hardly ever","votes":"5","type":"x","order":"3","pct":9.43,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.