cve/2010/CVE-2010-0211.md

18 lines
952 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2010-0211](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0211)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.
### POC
#### Reference
- http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6570
#### Github
No PoCs found on GitHub currently.