ArchLinux: 201509-4: openldap: denial of service
Summary
By sending a crafted packet, an attacker can cause the OpenLDAP daemon
to crash with a SIGABRT. This is due to an assert() call within the
ber_get_next method (io.c line 682) that is hit when decoding tampered
BER data.
The following proof of concept exploit can be used to trigger the condition:
# echo "/4SEhISEd4MKYj5ZMgAAAC8=" | base64 -d | nc -v 127.0.0.1 389
The above causes slapd to abort as follows when running with '-d3',
however it should be noted that this will crash the server even when
running in daemon mode.
Resolution
Upgrade to 2.4.42-2.
# pacman -Syu "openldap>=2.4.42-2"
The problem has been fixed upstream but no release is available yet.
References
https://bugs.openldap.org/show_bug.cgi https://git.openldap.org/explore;a=commitdiff;h=6fe51a9ab04fd28 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-6908 https://bugs.archlinux.org/task/46265
![Dist Arch](/images/distros/dist-arch.png)
Workaround
None.