Vulnerabilities > CVE-2006-6493 - Remote Security vulnerability in OpenLDAP

047910
CVSS 5.1 - MEDIUM
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
high complexity
openldap

Summary

Buffer overflow in the krbv4_ldap_auth function in servers/slapd/kerberos.c in OpenLDAP 2.4.3 and earlier, when OpenLDAP is compiled with the --enable-kbind (Kerberos KBIND) option, allows remote attackers to execute arbitrary code via an LDAP bind request using the LDAP_AUTH_KRBV41 authentication method and long credential data. Successful exploitation requires that OpenLDAP allows the use of the LDAPv2 protocol, and is compiled with the --enable-kbind (Kerberos KBIND) option which has been disabled by default since version 2.0.2 and was removed from the configure script in the 2.1 release.

Vulnerable Configurations

Part Description Count
Application
Openldap
120

Statements

contributorMark J Cox
lastmodified2006-12-19
organizationRed Hat
statementNot vulnerable. OpenLDAP as shipped with Red Hat Enterprise Linux 2.1, 3, and 4 does not support the LDAP_AUTH_KRBV41 authentication method.