search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Multiple implementations of LDAP Directory Server vulnerable to buffer overflow

Vulnerability Note VU#258905

Original Release Date: 2005-01-11 | Last Revised: 2005-01-14

Overview

A buffer overflow in some implementations of the LDAP protocol may allow a remote unauthenticated attacker to execute arbitrary code.

Description

The Lightweight Directory Access Protocol (LDAP) is a protocol for accessing network based directories. A lack of bounds checking in some implementations of the LDAP protocol may allow a buffer used to generate error messages to overflow. If a remote unauthenticated attacker supplies a LDAP server with a specially crafted request, they may be able to trigger the buffer overflow to compromise the vulnerable server.

Impact

A remote unauthenticated attacker may be able to execute arbitrary code on a vulnerable LDAP server with the privileges of the compromised LDAP process, or crash the LDAP process resulting in a denial-of-service condition.

Solution

Users who suspect they are vulnerable are encouraged to check with their vendor to determine the appropriate action to take.

Limit Access

Block or restrict access to the LDAP service (389/tcp or 636/tcp) on affected systems from untrusted networks such as the Internet. Sites, particularly those who are not able to apply the appropriate patches, are encouraged to consider implementing this workaround. Note that this change may break some desired functionality depending on particular site configuration details. As a general rule and a matter of good security practice, the CERT/CC recommends blocking access to all services that are not explicitly required.

Vendor Information

258905
 

View all 41 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to HIRT (Hitachi Incident Response Team).

This document was written by Damon Morda, Stacey Stewart and Jeffrey Gennari.

Other Information

CVE IDs: CVE-2004-1236
Severity Metric: 7.88
Date Public: 2005-01-11
Date First Published: 2005-01-11
Date Last Updated: 2005-01-14 21:38 UTC
Document Revision: 49

Sponsored by CISA.