The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[OpenPKG-SA-2006.033] OpenPKG Security Advisory (openldap)


<< Previous INDEX Search src / Print Next >>
Date: Fri, 10 Nov 2006 14:07:25 +0100
From: OpenPKG <openpkg@openpkg.org.>
To: [email protected]
Subject: [OpenPKG-SA-2006.033] OpenPKG Security Advisory (openldap)
Message-ID: <OpenPKG-SA-2006.033@openpkg.org.>
Reply-To: [email protected]
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Organization: The OpenPKG Project, http://www.openpkg.org/
User-Agent: Mutt/1.5.11 OpenPKG/2-STABLE
X-Virus-Scanned: antivirus-gw at tyumen.ru

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

OpenPKG Security Advisory                                   OpenPKG GmbH
http://openpkg.org/security/                          http://openpkg.com
OpenPKG-SA-2006.033                                           2006-11-10
________________________________________________________________________

Package:          openldap
Vulnerability:    denial of service
OpenPKG Specific: no

Affected Series:  Affected Packages:            Corrected Packages:
E1.0-SOLID        <= openldap-2.3.28-E1.0.0     >= openldap-2.3.28-E1.0.1
2-STABLE-20061018 <= openldap-2.3.27-2.20061018 >= openldap-2.3.29-2.20061110
2-STABLE          <= openldap-2.3.28-2.20061022 >= openldap-2.3.29-2.20061110
CURRENT           <= openldap-2.3.28-20061022   >= openldap-2.3.29-20061110

Description:
  Evgeny Legerov discovered [0] a vendor-confirmed [1] Denial-of-Service
  (DoS) vulnerability in OpenLDAP [2]. The vulnerability allows remote
  attackers to cause a DoS via a certain combination of LDAP "Bind"
  requests that trigger an assertion failure in "libldap". The flaw is
  caused by incorrectly computing the length of a normalized name. The
  Common Vulnerabilities and Exposures (CVE) project assigned the id
  CVE-2006-5779 [3] to the problem.
________________________________________________________________________

References:
  [0] http://www.securityfocus.com/archive/1/archive/1/450728/100/0/threaded
  [1] http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4740 
  [2] http://www.openldap.org/
  [3] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5779
________________________________________________________________________

For security reasons, this advisory was digitally signed with the
OpenPGP public key "OpenPKG <openpkg@openpkg.org.>" (ID 63C4CB9F) which
you can retrieve from http://openpkg.org/openpkg.org.pgp. Follow the
instructions on http://openpkg.org/security/signatures/ for details on
how to verify the integrity of this advisory.
________________________________________________________________________

-----BEGIN PGP SIGNATURE-----
Comment: OpenPKG <openpkg@openpkg.org.>

iD8DBQFFVHlkgHWT4GPEy58RAtZDAJ9sT2d1Fc7s0akhtId3PznPhbdPSQCcD8d9
OJiwSvaeQm/gRf9Ojk8ZXYk=
=xhBn
-----END PGP SIGNATURE-----


<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру