Heap-based buffer overflow in OpenLDAP - CVE-2011-4079
Published: October 27, 2011 / Updated: August 3, 2020
OpenLDAP
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Off-by-one error in the UTF8StringNormalize function in OpenLDAP 2.4.26 and earlier. A remote attacker can use a zero-length string that triggers a heap-based buffer overflow to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2011-4079
Sources
- http://secunia.com/advisories/46599
- http://security.gentoo.org/glsa/glsa-201406-36.xml
- http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commitdiff;h=507238713b71208ec4f262f312cb495a302df9e9
- http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7059;selectid=7059
- http://www.openwall.com/lists/oss-security/2011/10/26/5
- http://www.openwall.com/lists/oss-security/2011/10/26/9
- http://www.securityfocus.com/bid/50384
- http://www.ubuntu.com/usn/USN-1266-1
- https://bugzilla.redhat.com/show_bug.cgi?id=749324
- https://exchange.xforce.ibmcloud.com/vulnerabilities/70991