A denial of service flaw was found in the way the slapd server of the OpenLDAP, the Lightweight Directory Access Protocol applications and development suite, processed certain search queries requesting only attributes (no values) for a particular entry. A remote attacker could issue a specially-crafted LDAP search query, which once processed by a vulnerable slapd server would lead to assertion failure (slapd abort). Upstream bug report: [1] http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7143 Original upstream patch: [2] http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=ef2f5263de8802794e528cc2648ecfca369302ae Further patches: [3] http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=430256fafb85028443d7964a5ab1f4bbf8b2db38 [4] http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=463c1fa25d45e393dc1f1ea235286f79e872fad0 References: [5] http://www.openldap.org/software/release/changes.html [6] https://bugs.gentoo.org/show_bug.cgi?id=407941 [7] https://secunia.com/advisories/48372/
CVE Request: [8] http://www.openwall.com/lists/oss-security/2012/03/12/2
This was assigned the name CVE-2012-1164.
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2012:0899 https://rhn.redhat.com/errata/RHSA-2012-0899.html
Created openldap tracking bugs for this issue Affects: fedora-all [bug 829481]
Fedora 16 affected. Fedora 17, 18 not affected.
RHEL 5 affected ?
Statement: This issue did not affect openldap as shipped with Red Hat Enterprise Linux 5 as it did not contain the relevant assertion. This has been addressed in Red Hat Enterprise Linux 6 via https://rhn.redhat.com/errata/RHSA-2012-0899.html
openldap-2.4.26-8.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.