SB2011032003 - Multiple vulnerabilities in OpenLDAP



SB2011032003 - Multiple vulnerabilities in OpenLDAP

Published: March 20, 2011 Updated: August 11, 2020

Security Bulletin ID SB2011032003
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 67% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Resource management error (CVE-ID: CVE-2011-1081)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

modrdn.c in slapd in OpenLDAP 2.4.x before 2.4.24 allows remote attackers to cause a denial of service (daemon crash) via a relative Distinguished Name (DN) modification request (aka MODRDN operation) that contains an empty value for the OldDN field.


2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2011-1024)

The vulnerability allows a remote #AU# to read and manipulate data.

chain.c in back-ldap in OpenLDAP 2.4.x before 2.4.24, when a master-slave configuration with a chain overlay and ppolicy_forward_updates (aka authentication-failure forwarding) is used, allows remote authenticated users to bypass external-program authentication by sending an invalid password to a slave server.


3) Improper Authentication (CVE-ID: CVE-2011-1025)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

bind.cpp in back-ndb in OpenLDAP 2.4.x before 2.4.24 does not require authentication for the root Distinguished Name (DN), which allows remote attackers to bypass intended access restrictions via an arbitrary password.


Remediation

Install update from vendor's website.

References