Ubuntu Security Notice USN-965-1 August 09, 2010
openldap, openldap2.2, openldap2.3 vulnerabilities
CVE-2010-0211, CVE-2010-0212
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS
Ubuntu 8.04 LTS
Ubuntu 9.04
Ubuntu 9.10
Ubuntu 10.04 LTS
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 6.06 LTS:
slapd 2.2.26-5ubuntu2.10
Ubuntu 8.04 LTS:
slapd 2.4.9-0ubuntu0.8.04.4
Ubuntu 9.04:
slapd 2.4.15-1ubuntu3.1
Ubuntu 9.10:
slapd 2.4.18-0ubuntu1.1
Ubuntu 10.04 LTS:
slapd 2.4.21-0ubuntu5.2
In general, a standard system update will make all the necessary changes.
Details follow:
Using the Codenomicon LDAPv3 test suite, Ilkka Mattila and Tuomas
Salomäki discovered that the slap_modrdn2mods function in modrdn.c
in OpenLDAP does not check the return value from a call to the
smr_normalize function. A remote attacker could use specially crafted
modrdn requests to crash the slapd daemon or possibly execute arbitrary
code. (CVE-2010-0211)
Using the Codenomicon LDAPv3 test suite, Ilkka Mattila and Tuomas
Salomäki discovered that OpenLDAP does not properly handle empty
RDN strings. A remote attacker could use specially crafted modrdn
requests to crash the slapd daemon. (CVE-2010-0212)
In the default installation under Ubuntu 8.04 LTS and later, attackers
would be isolated by the OpenLDAP AppArmor profile for the slapd daemon.