Short Name |
LDAP:OVERFLOW:MODRDN-UTF8-EXEC |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
LDAP |
Keywords |
OpenLDAP Modrdn RDN UTF-8 String Code Execution |
Release Date |
2010/10/25 |
Update Number |
1798 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known code execution vulnerability in OpenLDAP. It is due to a memory corruption when handling a UTF8 string through modrdn. A remote attacker can exploit this by sending a malicious request through modrdn to connect to the target server. A successful attack allows injection and execution of arbitrary code in the context of the affect service. An unsuccessful attack causes termination of slapd daemon resulting in a denial-of-service condition.
OpenLDAP is prone to multiple vulnerabilities. Successfully exploiting these issues allows remote attackers to execute arbitrary code in the context of the application or cause denial-of-service conditions. OpenLDAP 2.4.22 is vulnerable; other versions may also be affected.