[arch-security] [ASA-201509-4] openldap: denial of service

Levente Polyak anthraxx at archlinux.org
Sat Sep 12 14:26:50 UTC 2015


Arch Linux Security Advisory ASA-201509-4
=========================================

Severity: High
Date    : 2015-09-12
CVE-ID  : CVE-2015-6908
Package : openldap
Type    : denial of service
Remote  : Yes
Link    : https://wiki.archlinux.org/index.php/CVE

Summary
=======

The package openldap before version 2.4.42-2 is vulnerable to a remote
denial of service.

Resolution
==========

Upgrade to 2.4.42-2.

# pacman -Syu "openldap>=2.4.42-2"

The problem has been fixed upstream but no release is available yet.

Workaround
==========

None.

Description
===========

By sending a crafted packet, an attacker can cause the OpenLDAP daemon
to crash with a SIGABRT. This is due to an assert() call within the
ber_get_next method (io.c line 682) that is hit when decoding tampered
BER data.
The following proof of concept exploit can be used to trigger the condition:

# echo "/4SEhISEd4MKYj5ZMgAAAC8=" | base64 -d | nc -v 127.0.0.1 389

The above causes slapd to abort as follows when running with '-d3',
however it should be noted that this will crash the server even when
running in daemon mode.

Impact
======

A remote attacker is able to send specially crafted packets that cause
the OpenLDAP server to crash, leading to denial of service.

References
==========

http://www.openldap.org/its/index.cgi/Software%20Bugs?id=8240
http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commitdiff;h=6fe51a9ab04fd28
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-6908
https://bugs.archlinux.org/task/46265

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20150912/c235e15b/attachment.asc>


More information about the arch-security mailing list