[arch-security] [ASA-201509-4] openldap: denial of service
anthraxx at archlinux.org
Sat Sep 12 14:26:50 UTC 2015
Arch Linux Security Advisory ASA-201509-4
Date : 2015-09-12
CVE-ID : CVE-2015-6908
Package : openldap
Type : denial of service
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
The package openldap before version 2.4.42-2 is vulnerable to a remote
denial of service.
Upgrade to 2.4.42-2.
# pacman -Syu "openldap>=2.4.42-2"
The problem has been fixed upstream but no release is available yet.
By sending a crafted packet, an attacker can cause the OpenLDAP daemon
to crash with a SIGABRT. This is due to an assert() call within the
ber_get_next method (io.c line 682) that is hit when decoding tampered
The following proof of concept exploit can be used to trigger the condition:
# echo "/4SEhISEd4MKYj5ZMgAAAC8=" | base64 -d | nc -v 127.0.0.1 389
The above causes slapd to abort as follows when running with '-d3',
however it should be noted that this will crash the server even when
running in daemon mode.
A remote attacker is able to send specially crafted packets that cause
the OpenLDAP server to crash, leading to denial of service.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 819 bytes
Desc: OpenPGP digital signature
More information about the arch-security