Vulnerabilities > CVE-2008-2952 - Resource Management Errors vulnerability in Openldap

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
openldap
CWE-399
nessus
exploit available

Summary

liblber/io.c in OpenLDAP 2.2.4 to 2.4.10 allows remote attackers to cause a denial of service (program termination) via crafted ASN.1 BER datagrams that trigger an assertion error.

Common Weakness Enumeration (CWE)

Exploit-Db

descriptionOpenLDAP 2.3.41 BER Decoding Remote Denial of Service Vulnerability. CVE-2008-2952. Dos exploit for linux platform
idEDB-ID:32000
last seen2016-02-03
modified2008-06-30
published2008-06-30
reporterCameron Hotchkies
sourcehttps://www.exploit-db.com/download/32000/
titleOpenLDAP <= 2.3.41 BER Decoding Remote Denial of Service Vulnerability

Nessus

  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2008-0583.NASL
    descriptionFrom Red Hat Security Advisory 2008:0583 : Updated openldap packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. OpenLDAP is an open source suite of Lightweight Directory Access Protocol (LDAP) applications and development tools. LDAP is a set of protocols for accessing directory services. A denial of service flaw was found in the way the OpenLDAP slapd daemon processed certain network messages. An unauthenticated remote attacker could send a specially crafted request that would crash the slapd daemon. (CVE-2008-2952) Users of openldap should upgrade to these updated packages, which contain a backported patch to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id67724
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/67724
    titleOracle Linux 4 / 5 : openldap (ELSA-2008-0583)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2008-0583.NASL
    descriptionUpdated openldap packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. OpenLDAP is an open source suite of Lightweight Directory Access Protocol (LDAP) applications and development tools. LDAP is a set of protocols for accessing directory services. A denial of service flaw was found in the way the OpenLDAP slapd daemon processed certain network messages. An unauthenticated remote attacker could send a specially crafted request that would crash the slapd daemon. (CVE-2008-2952) Users of openldap should upgrade to these updated packages, which contain a backported patch to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id33490
    published2008-07-15
    reporterThis script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/33490
    titleCentOS 4 / 5 : openldap (CESA-2008:0583)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2008-6062.NASL
    descriptionThis update fixes CVE-2008-2952 - remote unauthenticated slapd DoS. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id33412
    published2008-07-08
    reporterThis script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/33412
    titleFedora 9 : openldap-2.4.8-6.fc9 (2008-6062)
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_SECUPD2008-005.NASL
    descriptionThe remote host is running a version of Mac OS X 10.5 or 10.4 that does not have the security update 2008-005 applied. This update contains security fixes for a number of programs.
    last seen2020-06-01
    modified2020-06-02
    plugin id33790
    published2008-08-01
    reporterThis script is Copyright (C) 2008-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/33790
    titleMac OS X Multiple Vulnerabilities (Security Update 2008-005)
  • NASL familySuSE Local Security Checks
    NASL idSUSE9_12222.NASL
    descriptionThis update fixes a security problem in the liblber client library of openldap that allowed remote attackers to cause a denial of service (program termination) via crafted ASN.1 BER datagrams, which triggers an assertion error. (CVE-2008-2952) Additionally a bug was fixed in ldap_free_connection which could result in client crashes when the server closed a connection while an operation is active.
    last seen2020-06-01
    modified2020-06-02
    plugin id41232
    published2009-09-24
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/41232
    titleSuSE9 Security Update : OpenLDAP 2 (YOU Patch Number 12222)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-1650.NASL
    descriptionCameron Hotchkies discovered that the OpenLDAP server slapd, a free implementation of the Lightweight Directory Access Protocol, could be crashed by sending malformed ASN1 requests.
    last seen2020-06-01
    modified2020-06-02
    plugin id34386
    published2008-10-13
    reporterThis script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/34386
    titleDebian DSA-1650-1 : openldap2.3 - denial of service
  • NASL familySuSE Local Security Checks
    NASL idSUSE_OPENLDAP2-5511.NASL
    descriptionThis update fixes a security problem in the liblber client library of openldap that allowed remote attackers to cause a denial of service (program termination) via crafted ASN.1 BER datagrams, which triggers an assertion error. (CVE-2008-2952) Additionally a bug was fixed in ldap_free_connection which could result in client crashes when the server closed a connection while an operation is active.
    last seen2020-06-01
    modified2020-06-02
    plugin id34441
    published2008-10-17
    reporterThis script is Copyright (C) 2008-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/34441
    titleSuSE 10 Security Update : OpenLDAP 2 (ZYPP Patch Number 5511)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2008-144.NASL
    descriptionA denial of service vulnerability was discovered in the way the OpenLDAP slapd daemon processed certain network messages. An unauthenticated remote attacker could send a specially crafted request that would crash the slapd daemon (CVE-2008-2952). The updated packages have been patched to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id36770
    published2009-04-23
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/36770
    titleMandriva Linux Security Advisory : openldap (MDVSA-2008:144)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2008-6029.NASL
    descriptionThis update fixes CVE-2008-2952 - remote unauthenticated slapd DoS. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id33407
    published2008-07-08
    reporterThis script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/33407
    titleFedora 8 : openldap-2.3.39-4.fc8 (2008-6029)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2008-0583.NASL
    descriptionUpdated openldap packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. OpenLDAP is an open source suite of Lightweight Directory Access Protocol (LDAP) applications and development tools. LDAP is a set of protocols for accessing directory services. A denial of service flaw was found in the way the OpenLDAP slapd daemon processed certain network messages. An unauthenticated remote attacker could send a specially crafted request that would crash the slapd daemon. (CVE-2008-2952) Users of openldap should upgrade to these updated packages, which contain a backported patch to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id33475
    published2008-07-10
    reporterThis script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/33475
    titleRHEL 4 / 5 : openldap (RHSA-2008:0583)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20080709_OPENLDAP_ON_SL4_X.NASL
    descriptionA denial of service flaw was found in the way the OpenLDAP slapd daemon processed certain network messages. An unauthenticated remote attacker could send a specially crafted request that would crash the slapd daemon. (CVE-2008-2952)
    last seen2020-06-01
    modified2020-06-02
    plugin id60436
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/60436
    titleScientific Linux Security Update : openldap on SL4.x, SL5.x i386/x86_64
  • NASL familySuSE Local Security Checks
    NASL idSUSE_OPENLDAP2-5509.NASL
    descriptionThis update fixes a security problem in the liblber client library of openldap that allowed remote attackers to cause a denial of service (program termination) via crafted ASN.1 BER datagrams, which triggers an assertion error. (CVE-2008-2952) Additionally a bug was fixed in ldap_free_connection which could result in client crashes when the server closed a connection while an operation is active.
    last seen2020-06-01
    modified2020-06-02
    plugin id34440
    published2008-10-17
    reporterThis script is Copyright (C) 2008-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/34440
    titleopenSUSE 10 Security Update : openldap2 (openldap2-5509)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200808-09.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200808-09 (OpenLDAP: Denial of Service vulnerability) Cameron Hotchkies discovered an error within the parsing of ASN.1 BER encoded packets in the
    last seen2020-06-01
    modified2020-06-02
    plugin id33855
    published2008-08-10
    reporterThis script is Copyright (C) 2008-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/33855
    titleGLSA-200808-09 : OpenLDAP: Denial of Service vulnerability
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_0_OPENLDAP2-080813.NASL
    descriptionThis update fixes a security problem in the liblber client library of openldap that allowed remote attackers to cause a denial of service (program termination) via crafted ASN.1 BER datagrams, which triggers an assertion error. (CVE-2008-2952) Additionally a bug was fixed in ldap_free_connection which could result in client crashes when the server closed a connection while an operation is active.
    last seen2020-06-01
    modified2020-06-02
    plugin id40084
    published2009-07-21
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/40084
    titleopenSUSE Security Update : openldap2 (openldap2-145)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-634-1.NASL
    descriptionCameron Hotchkies discovered that OpenLDAP did not correctly handle certain ASN.1 BER data. A remote attacker could send a specially crafted packet and crash slapd, leading to a denial of service. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id33809
    published2008-08-04
    reporterUbuntu Security Notice (C) 2008-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/33809
    titleUbuntu 6.06 LTS / 7.04 / 7.10 / 8.04 LTS : openldap2.2, openldap2.3 vulnerability (USN-634-1)

Oval

accepted2013-04-29T04:07:32.516-04:00
classvulnerability
contributors
  • nameAharon Chernin
    organizationSCAP.com, LLC
  • nameDragos Prisaca
    organizationG2, Inc.
definition_extensions
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 4
    ovaloval:org.mitre.oval:def:11831
  • commentCentOS Linux 4.x
    ovaloval:org.mitre.oval:def:16636
  • commentOracle Linux 4.x
    ovaloval:org.mitre.oval:def:15990
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 5
    ovaloval:org.mitre.oval:def:11414
  • commentThe operating system installed on the system is CentOS Linux 5.x
    ovaloval:org.mitre.oval:def:15802
  • commentOracle Linux 5.x
    ovaloval:org.mitre.oval:def:15459
descriptionliblber/io.c in OpenLDAP 2.2.4 to 2.4.10 allows remote attackers to cause a denial of service (program termination) via crafted ASN.1 BER datagrams that trigger an assertion error.
familyunix
idoval:org.mitre.oval:def:10662
statusaccepted
submitted2010-07-09T03:56:16-04:00
titleliblber/io.c in OpenLDAP 2.2.4 to 2.4.10 allows remote attackers to cause a denial of service (program termination) via crafted ASN.1 BER datagrams that trigger an assertion error.
version27

Redhat

advisories
bugzilla
id453444
titleCVE-2008-2952 OpenLDAP denial-of-service flaw in ASN.1 decoder
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 4 is installed
      ovaloval:com.redhat.rhba:tst:20070304025
    • OR
      • AND
        • commentopenldap-devel is earlier than 0:2.2.13-8.el4_6.5
          ovaloval:com.redhat.rhsa:tst:20080583001
        • commentopenldap-devel is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20070310006
      • AND
        • commentcompat-openldap is earlier than 0:2.1.30-8.el4_6.5
          ovaloval:com.redhat.rhsa:tst:20080583003
        • commentcompat-openldap is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20070310008
      • AND
        • commentopenldap is earlier than 0:2.2.13-8.el4_6.5
          ovaloval:com.redhat.rhsa:tst:20080583005
        • commentopenldap is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20070310002
      • AND
        • commentopenldap-servers is earlier than 0:2.2.13-8.el4_6.5
          ovaloval:com.redhat.rhsa:tst:20080583007
        • commentopenldap-servers is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20070310012
      • AND
        • commentopenldap-servers-sql is earlier than 0:2.2.13-8.el4_6.5
          ovaloval:com.redhat.rhsa:tst:20080583009
        • commentopenldap-servers-sql is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20070310010
      • AND
        • commentopenldap-clients is earlier than 0:2.2.13-8.el4_6.5
          ovaloval:com.redhat.rhsa:tst:20080583011
        • commentopenldap-clients is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20070310004
  • AND
    • commentRed Hat Enterprise Linux 5 is installed
      ovaloval:com.redhat.rhba:tst:20070331005
    • OR
      • AND
        • commentopenldap is earlier than 0:2.3.27-8.el5_2.4
          ovaloval:com.redhat.rhsa:tst:20080583014
        • commentopenldap is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20071037006
      • AND
        • commentcompat-openldap is earlier than 0:2.3.27_2.2.29-8.el5_2.4
          ovaloval:com.redhat.rhsa:tst:20080583016
        • commentcompat-openldap is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20071037004
      • AND
        • commentopenldap-servers is earlier than 0:2.3.27-8.el5_2.4
          ovaloval:com.redhat.rhsa:tst:20080583018
        • commentopenldap-servers is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20071037008
      • AND
        • commentopenldap-servers-sql is earlier than 0:2.3.27-8.el5_2.4
          ovaloval:com.redhat.rhsa:tst:20080583020
        • commentopenldap-servers-sql is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20071037010
      • AND
        • commentopenldap-clients is earlier than 0:2.3.27-8.el5_2.4
          ovaloval:com.redhat.rhsa:tst:20080583022
        • commentopenldap-clients is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20071037012
      • AND
        • commentopenldap-devel is earlier than 0:2.3.27-8.el5_2.4
          ovaloval:com.redhat.rhsa:tst:20080583024
        • commentopenldap-devel is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20071037002
rhsa
idRHSA-2008:0583
released2008-07-09
severityImportant
titleRHSA-2008:0583: openldap security update (Important)
rpms
  • compat-openldap-0:2.1.30-8.el4_6.5
  • compat-openldap-0:2.3.27_2.2.29-8.el5_2.4
  • openldap-0:2.2.13-8.el4_6.5
  • openldap-0:2.3.27-8.el5_2.4
  • openldap-clients-0:2.2.13-8.el4_6.5
  • openldap-clients-0:2.3.27-8.el5_2.4
  • openldap-debuginfo-0:2.2.13-8.el4_6.5
  • openldap-debuginfo-0:2.3.27-8.el5_2.4
  • openldap-devel-0:2.2.13-8.el4_6.5
  • openldap-devel-0:2.3.27-8.el5_2.4
  • openldap-servers-0:2.2.13-8.el4_6.5
  • openldap-servers-0:2.3.27-8.el5_2.4
  • openldap-servers-sql-0:2.2.13-8.el4_6.5
  • openldap-servers-sql-0:2.3.27-8.el5_2.4

References