Linux Security
    Linux Security
    Linux Security

    Debian: DSA-2077-1: New openldap packages fix potential code execution

    Date 29 Jul 2010
    Posted By LinuxSecurity Advisories
    Two remote vulnerabilities have been discovered in OpenLDAP. The Common Vulnerabilities and Exposures project identifies the following problems:
    Hash: SHA1
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-2077-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.                           Florian Weimer
    July 29, 2010               
    - ------------------------------------------------------------------------
    Package        : openldap
    Vulnerability  : several
    Problem type   : remote
    Debian-specific: no
    CVE Id(s)      : CVE-2010-0211 CVE-2010-0212
    Two remote vulnerabilities have been discovered in OpenLDAP.  The
    Common Vulnerabilities and Exposures project identifies the following
        The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does
        not check the return value of a call to the smr_normalize
        function, which allows remote attackers to cause a denial of
        service (segmentation fault) and possibly execute arbitrary code
        via a modrdn call with an RDN string containing invalid UTF-8
        OpenLDAP 2.4.22 allows remote attackers to cause a denial of
        service (crash) via a modrdn call with a zero-length RDN
        destination string.
    For the stable distribution (lenny), this problem has been fixed in
    version 2.4.11-1+lenny2.  (The missing update for the mips
    architecture will be provided soon.)
    For the unstable distribution (sid), this problem has been fixed in
    version 2.4.23-1.
    We recommend that you upgrade your openldap packages.
    Upgrade instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 5.0 alias lenny
    - --------------------------------
    Source archives:
        Size/MD5 checksum:     1831 afe836285d70b3d51b50d06658b7cc22
        Size/MD5 checksum:  4193523 d4e8669e2c9b8d981e371e97e3cf92d9
        Size/MD5 checksum:   149276 e9668ba9648e3e1f306a97c6cc77d5a3
    alpha architecture (DEC Alpha)
        Size/MD5 checksum:  1018392 d18b30dd684b7582ba3f5fda7c0ec52d
        Size/MD5 checksum:   284794 3d3094d356fa97396dd53701ff8177c1
        Size/MD5 checksum:  3625184 8c651f17c240c4222c26783e1333d7b4
        Size/MD5 checksum:   281172 d91f060a2e0e9b3f7651913228e33a45
        Size/MD5 checksum:   206338 7a268eec31460d56dfa4e51000a0f20e
        Size/MD5 checksum:  1534546 70ae45ec33481afbf305544bf9d70cb0
    amd64 architecture (AMD x86_64 (AMD64))
        Size/MD5 checksum:   205426 c7fecb2287a970a5b06e1dd053413cf6
        Size/MD5 checksum:  3665336 a25a01da15aed085d7476043a69c9f43
        Size/MD5 checksum:   266508 be5e6b39fb89340139dbde19f09a6777
        Size/MD5 checksum:   972300 a73c35b4c7f48427a8fd5fe971c1aac4
        Size/MD5 checksum:   299624 b132ed70255863a64e1eb94a5700dbf0
        Size/MD5 checksum:  1509162 0e9758a242eb928e9c5287d2801f280b
    arm architecture (ARM)
        Size/MD5 checksum:  1413404 2ff76be2a9be2109b995d2fbb89ba776
        Size/MD5 checksum:   248960 042b8f1642b8ea512ba4abdf8a60d2b3
        Size/MD5 checksum:  3576526 6c38ec7d7a9e3a35e043cdb4276b837c
        Size/MD5 checksum:   869398 5f75a2717d71579905ba1058d530ede0
        Size/MD5 checksum:   179976 b69cc3f9fd1f4f09eb015e28b60d3b3a
        Size/MD5 checksum:   279998 0534bb7fb3fc4eaf311bf846dfb3c800
    armel architecture (ARM EABI)
        Size/MD5 checksum:   244982 09dc4f6dc96aab40b399b52cdd440f49
        Size/MD5 checksum:   281290 ed72c73b8018e02b579af7fc8652ad5a
        Size/MD5 checksum:   179660 3ca1f0b69016395df01441d2be719acb
        Size/MD5 checksum:   863030 4382d905de1db012e3197c1b4cbd53f9
        Size/MD5 checksum:  3583978 00372759861243bb13585f34bf93be4b
        Size/MD5 checksum:  1407120 b0fa8a6ea8d9b2305967c1f6486fa901
    hppa architecture (HP PA RISC)
        Size/MD5 checksum:   998740 a675f6577888e4518b38fe32ed9c0954
        Size/MD5 checksum:  1532150 1eaf00efdb3f58b494466c6af919d27b
        Size/MD5 checksum:   264082 b88df4740a44865d431b292f0e029475
        Size/MD5 checksum:   284888 7ce39229438af13c8220edece4e9c856
        Size/MD5 checksum:  3621796 d4307c86696c24a200ac12a310885289
        Size/MD5 checksum:   201312 e826b1ca00ff0f50fb9472d5f28551f6
    i386 architecture (Intel ia32)
        Size/MD5 checksum:  3562530 a1866b654c74dadd577d7a8322285553
        Size/MD5 checksum:   189038 039bf2208067cb5899a6c9ae6364a74d
        Size/MD5 checksum:   286894 0acddd599377272201cd6788a0f19bdc
        Size/MD5 checksum:   244480 d2ca1f47200257729bfde83e67526527
        Size/MD5 checksum:  1397792 3740fe46b91fa94690c5cb081b286041
        Size/MD5 checksum:   870436 f92b3b1928099d93ae35a98e9a75ac65
    ia64 architecture (Intel ia64)
        Size/MD5 checksum:  1038332 2a23da950b3354b1027cb991ba2e9bd1
        Size/MD5 checksum:  2016204 54caa4d0966584b247bc4cffdac00d94
        Size/MD5 checksum:   269460 89ba522a4c15ac0dacb6537edf468bb9
        Size/MD5 checksum:   352176 383c904bee22aee1d94d238de24768e0
        Size/MD5 checksum:  3590732 49ac7b30b339381b7d01f9d86ac7e54f
        Size/MD5 checksum:   258836 36313ee33851fcc77c9a49bb340f30b2
    mipsel architecture (MIPS (Little Endian))
        Size/MD5 checksum:  3641930 05338b1bcd1ae4a5d921023ce12baa24
        Size/MD5 checksum:  1388338 045112a49ef59f53286e6ff8dcf56f1c
        Size/MD5 checksum:   181222 e2fc86fb9b0e1ca335aa92bdd9ee8088
        Size/MD5 checksum:   261520 f4317c50476ed380b91546a81753483f
        Size/MD5 checksum:   296334 5c106ddb8aab107366077d8bf6c013e4
        Size/MD5 checksum:   846022 87238f27ad1428d0ae2b2555cc5831c7
    powerpc architecture (PowerPC)
        Size/MD5 checksum:   295538 7193f88b4fc784f1bc49e16db44bc451
        Size/MD5 checksum:   199352 7cdb792324d09442a7029f768300a830
        Size/MD5 checksum:  1558086 d65f456faf9ac835725a86c3a0c13122
        Size/MD5 checksum:   981510 805f717025ed2e56d241e98987173012
        Size/MD5 checksum:  3721030 85d95b637bcd3de3527cb11554f54d8e
        Size/MD5 checksum:   284672 d49b7a5067b6671933194b849f2f5419
    s390 architecture (IBM S/390)
        Size/MD5 checksum:  1045564 a9c32d3b14f6969228def0dab1f7209c
        Size/MD5 checksum:   298596 07c975378ad71d9d83ba951f71dc4140
        Size/MD5 checksum:   266258 d6bfe59a7514b370eea5380d30e4d5b2
        Size/MD5 checksum:  3700520 c032e0d5e2a209597a7c40e3c6aedfb0
        Size/MD5 checksum:  1497898 6b20aec732079628189c126595676d80
        Size/MD5 checksum:   204656 ded26b56657fd5db7686c8163aa9ac11
    sparc architecture (Sun SPARC/UltraSPARC)
        Size/MD5 checksum:  1394762 207402a46ff26af86197ea981ea25ab8
        Size/MD5 checksum:   248828 013b1d3f070546d2524cbe4d49370810
        Size/MD5 checksum:   182914 4e271359df09ba43102089da55778d9a
        Size/MD5 checksum:   858646 e5e75c350ab491ad5a90413bc1de84df
        Size/MD5 checksum:   261014 37c7cc86a4ae1e84ad9e42b8a302a9e8
        Size/MD5 checksum:  3501616 2b2fc3cb381ccf9b10901e90999a7403
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"8","type":"x","order":"1","pct":28.57,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":21.43,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"14","type":"x","order":"3","pct":50,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.