Vigil@nce: OpenLDAP, denials of service
April 2009 by Marc Jacob
SYNTHESIS OF THE VULNERABILITY
An attacker can generate two denials of service in OpenLDAP.
Severity: 2/4
Consequences: denial of service of service
Provenance: intranet client
Means of attack: no proof of concept, no attack
Ability of attacker: expert (4/4)
Confidence: confirmed by the editor (5/5)
Diffusion of the vulnerable configuration: high (3/3)
Number of vulnerabilities in this bulletin: 2
Creation date: 06/04/2009
IMPACTED PRODUCTS
– OpenLDAP
DESCRIPTION OF THE VULNERABILITY
SSL/TLS client certificates are used to authenticate the LDAP
client. Two denials of service were announced in their handling by
OpenLDAP.
An attacker can use a client certificate to create a memory leak.
[grav:1/4; ITS#5849]
An attacker can use a certificate with a malicious DN
(Distinguished Name) in order to stop OpenLDAP. [grav:2/4;
ITS#5976]
An attacker can therefore connect to the LDAP service with a
malicious certificate in order to stop it.
CHARACTERISTICS
Identifiers: ITS#5849, ITS#5976, VIGILANCE-VUL-8599
http://vigilance.fr/vulnerability/OpenLDAP-denials-of-service-8599