<<< Date Index >>>     <<< Thread Index >>>

[OpenPKG-SA-2006.033] OpenPKG Security Advisory (openldap)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

OpenPKG Security Advisory                                   OpenPKG GmbH
http://openpkg.org/security/                          http://openpkg.com
OpenPKG-SA-2006.033                                           2006-11-10
________________________________________________________________________

Package:          openldap
Vulnerability:    denial of service
OpenPKG Specific: no

Affected Series:  Affected Packages:            Corrected Packages:
E1.0-SOLID        <= openldap-2.3.28-E1.0.0     >= openldap-2.3.28-E1.0.1
2-STABLE-20061018 <= openldap-2.3.27-2.20061018 >= openldap-2.3.29-2.20061110
2-STABLE          <= openldap-2.3.28-2.20061022 >= openldap-2.3.29-2.20061110
CURRENT           <= openldap-2.3.28-20061022   >= openldap-2.3.29-20061110

Description:
  Evgeny Legerov discovered [0] a vendor-confirmed [1] Denial-of-Service
  (DoS) vulnerability in OpenLDAP [2]. The vulnerability allows remote
  attackers to cause a DoS via a certain combination of LDAP "Bind"
  requests that trigger an assertion failure in "libldap". The flaw is
  caused by incorrectly computing the length of a normalized name. The
  Common Vulnerabilities and Exposures (CVE) project assigned the id
  CVE-2006-5779 [3] to the problem.
________________________________________________________________________

References:
  [0] http://www.securityfocus.com/archive/1/archive/1/450728/100/0/threaded
  [1] http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4740 
  [2] http://www.openldap.org/
  [3] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5779
________________________________________________________________________

For security reasons, this advisory was digitally signed with the
OpenPGP public key "OpenPKG <openpkg@xxxxxxxxxxx>" (ID 63C4CB9F) which
you can retrieve from http://openpkg.org/openpkg.org.pgp. Follow the
instructions on http://openpkg.org/security/signatures/ for details on
how to verify the integrity of this advisory.
________________________________________________________________________

-----BEGIN PGP SIGNATURE-----
Comment: OpenPKG <openpkg@xxxxxxxxxxx>

iD8DBQFFVHlkgHWT4GPEy58RAtZDAJ9sT2d1Fc7s0akhtId3PznPhbdPSQCcD8d9
OJiwSvaeQm/gRf9Ojk8ZXYk=
=xhBn
-----END PGP SIGNATURE-----