6th Feb 2003 [SBWID-5975]
COMMAND
openldap setuid .ldaprc buffer overflow
SYSTEMS AFFECTED
openldap all prior to 1.2.13-2 ?
PROBLEM
In RedHat security advisory [RHSA-2003:040-07] :
http://www.redhat.com/solutions/security/news/
--snip--
OpenLDAP is a suite of LDAP (Lightweight Directory Access Protocol)
applications and development tools. LDAP is a set of protocols for
accessing directory services. In an audit of OpenLDAP by SuSE, a number
of potential security issues were found:
When reading configuration files, libldap would read the current user's
.ldaprc file even in applications being run with elevated privileges.
Slurpd would overflow an internal buffer if the command-line argument
used with the -t or -r flags was too long, or if the name of a file for
which it attempted to create an advisory lock was too long.
When parsing filters, the getfilter family of functions from libldap
could be made to overflow an internal buffer by supplying a carefully
crafted ldapfilter.conf file.
When processing LDAP entry display templates, libldap could be made to
overflow an internal buffer by supplying a properly crafted
ldaptemplates.conf file.
When parsing an access control list, slapd could be made to overflow an
internal buffer.
When constructing the name of the file used for logging rejected
replication requests, slapd would overflow an internal buffer if the
size of the generated name was too large, and could be tricked into
destroying the contents of any file owned by the ldap user due to a
race condition in the subsequent creation of the log file.
Red Hat Linux users who use LDAP are advised to install the updated
openldap packages which are not vulnerable to these issues.
--snap--
SOLUTION
openldap-1.2.13-2 available