Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:15004
HistoryNov 11, 2006 - 12:00 a.m.

[OpenPKG-SA-2006.033] OpenPKG Security Advisory (openldap)

2006-11-1100:00:00
vulners.com
10

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


OpenPKG Security Advisory OpenPKG GmbH
http://openpkg.org/security/ http://openpkg.com
OpenPKG-SA-2006.033 2006-11-10


Package: openldap
Vulnerability: denial of service
OpenPKG Specific: no

Affected Series: Affected Packages: Corrected Packages:
E1.0-SOLID <= openldap-2.3.28-E1.0.0 >= openldap-2.3.28-E1.0.1
2-STABLE-20061018 <= openldap-2.3.27-2.20061018 >= openldap-2.3.29-2.20061110
2-STABLE <= openldap-2.3.28-2.20061022 >= openldap-2.3.29-2.20061110
CURRENT <= openldap-2.3.28-20061022 >= openldap-2.3.29-20061110

Description:
Evgeny Legerov discovered [0] a vendor-confirmed [1] Denial-of-Service
(DoS) vulnerability in OpenLDAP [2]. The vulnerability allows remote
attackers to cause a DoS via a certain combination of LDAP "Bind"
requests that trigger an assertion failure in "libldap". The flaw is
caused by incorrectly computing the length of a normalized name. The
Common Vulnerabilities and Exposures (CVE) project assigned the id
CVE-2006-5779 [3] to the problem.


References:
[0] http://www.securityfocus.com/archive/1/archive/1/450728/100/0/threaded
[1] http://www.openldap.org/its/index.cgi/Software&#37;20Bugs?id=4740
[2] http://www.openldap.org/
[3] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5779


For security reasons, this advisory was digitally signed with the
OpenPGP public key "OpenPKG <[email protected]>" (ID 63C4CB9F) which
you can retrieve from http://openpkg.org/openpkg.org.pgp. Follow the
instructions on http://openpkg.org/security/signatures/ for details on
how to verify the integrity of this advisory.


-----BEGIN PGP SIGNATURE-----
Comment: OpenPKG <[email protected]>

iD8DBQFFVHlkgHWT4GPEy58RAtZDAJ9sT2d1Fc7s0akhtId3PznPhbdPSQCcD8d9
OJiwSvaeQm/gRf9Ojk8ZXYk=
=xhBn
-----END PGP SIGNATURE-----