exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 32254

Secunia Security Advisory 32254
Posted Oct 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for openldap. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, debian
SHA-256 | efea1de6c4a64ec201f849288882c2dbfd729dd8ca823b31d0eba751bfae9f44

Secunia Security Advisory 32254

Change Mirror Download
----------------------------------------------------------------------

Do you need accurate and reliable IDS / IPS / AV detection rules?

Get in-depth vulnerability details:
http://secunia.com/binary_analysis/sample_analysis/

----------------------------------------------------------------------

TITLE:
Debian update for openldap

SECUNIA ADVISORY ID:
SA32254

VERIFY ADVISORY:
http://secunia.com/advisories/32254/

CRITICAL:
Less critical

IMPACT:
DoS

WHERE:
>From local network

OPERATING SYSTEM:
Debian GNU/Linux 4.0
http://secunia.com/advisories/product/13844/
Debian GNU/Linux unstable alias sid
http://secunia.com/advisories/product/530/

DESCRIPTION:
Debian has issued an update for openldap. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

For more information:
SA30853

SOLUTION:
Apply updated packages.

-- Debian GNU/Linux 4.0 alias etch --

Source archives:

http://security.debian.org/pool/updates/main/o/openldap2.3/openldap2.3_2.3.30.orig.tar.gz
Size/MD5 checksum:2971126 c40bcc23fa65908b8d7a86a4a6061251
http://security.debian.org/pool/updates/main/o/openldap2.3/openldap2.3_2.3.30-5+etch2.diff.gz
Size/MD5 checksum: 311809 22b5eafd6a8e6375ffe3fec5533a1d5d
http://security.debian.org/pool/updates/main/o/openldap2.3/openldap2.3_2.3.30-5+etch2.dsc
Size/MD5 checksum: 1205 d266aa1b763c9f0d91f7b062bfb65c86

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/o/openldap2.3/slapd_2.3.30-5+etch2_alpha.deb
Size/MD5 checksum:1280050 180958ccc394210e2b04ac1c532118cd
http://security.debian.org/pool/updates/main/o/openldap2.3/libldap-2.3-0_2.3.30-5+etch2_alpha.deb
Size/MD5 checksum: 292722 cb1433274dce06173ea7e97051863c2b
http://security.debian.org/pool/updates/main/o/openldap2.3/ldap-utils_2.3.30-5+etch2_alpha.deb
Size/MD5 checksum: 193424 61f779bea372ee467a4691e219547c21

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/o/openldap2.3/slapd_2.3.30-5+etch2_amd64.deb
Size/MD5 checksum:1244538 37c9d1aba2a53ff6562678a25b6147ef
http://security.debian.org/pool/updates/main/o/openldap2.3/libldap-2.3-0_2.3.30-5+etch2_amd64.deb
Size/MD5 checksum: 285314 a81dd9a9a2d661d95897ca71d5a68527
http://security.debian.org/pool/updates/main/o/openldap2.3/ldap-utils_2.3.30-5+etch2_amd64.deb
Size/MD5 checksum: 184558 e22fd11d64bad96ad7a5c6a76f69c872

arm architecture (ARM)

http://security.debian.org/pool/updates/main/o/openldap2.3/libldap-2.3-0_2.3.30-5+etch2_arm.deb
Size/MD5 checksum: 254636 1537a42a4c76d3c40feb4e35adf10abc
http://security.debian.org/pool/updates/main/o/openldap2.3/ldap-utils_2.3.30-5+etch2_arm.deb
Size/MD5 checksum: 141986 fbda3408d6b35a34cd43875ee39c038a
http://security.debian.org/pool/updates/main/o/openldap2.3/slapd_2.3.30-5+etch2_arm.deb
Size/MD5 checksum:1188920 b556015d8462a5eff9e5c00cf65658ff

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/o/openldap2.3/libldap-2.3-0_2.3.30-5+etch2_hppa.deb
Size/MD5 checksum: 292550 a99048fa9bbf6e524a9854c7874481b3
http://security.debian.org/pool/updates/main/o/openldap2.3/slapd_2.3.30-5+etch2_hppa.deb
Size/MD5 checksum:1304974 8a352883c7359d68ac65bef523c8c37d
http://security.debian.org/pool/updates/main/o/openldap2.3/ldap-utils_2.3.30-5+etch2_hppa.deb
Size/MD5 checksum: 176956 dc8668a17000f0b6c6993dca2aed517a

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/o/openldap2.3/libldap-2.3-0_2.3.30-5+etch2_i386.deb
Size/MD5 checksum: 266054 84bb5bde130cbc49cce8654fbbf145ed
http://security.debian.org/pool/updates/main/o/openldap2.3/ldap-utils_2.3.30-5+etch2_i386.deb
Size/MD5 checksum: 154168 a73aa2fe4c60f7c74dfb7586ad7e9274
http://security.debian.org/pool/updates/main/o/openldap2.3/slapd_2.3.30-5+etch2_i386.deb
Size/MD5 checksum:1174324 e23a1aa2d33eccb2af662fbe4e5b9f6d

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/o/openldap2.3/slapd_2.3.30-5+etch2_ia64.deb
Size/MD5 checksum:1660820 2cd17aac1591b7f6dbc8ad9806ad7821
http://security.debian.org/pool/updates/main/o/openldap2.3/libldap-2.3-0_2.3.30-5+etch2_ia64.deb
Size/MD5 checksum: 379572 112ff502ca043d71907f05ad316aaa0b
http://security.debian.org/pool/updates/main/o/openldap2.3/ldap-utils_2.3.30-5+etch2_ia64.deb
Size/MD5 checksum: 239140 db04191db37a5bf2dec66f115803ed70

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/o/openldap2.3/slapd_2.3.30-5+etch2_mips.deb
Size/MD5 checksum:1205670 2eae08b5aa3717fa050f24831870a835
http://security.debian.org/pool/updates/main/o/openldap2.3/ldap-utils_2.3.30-5+etch2_mips.deb
Size/MD5 checksum: 185522 9cb2d778a25d6c904bd84abbbc89fddd
http://security.debian.org/pool/updates/main/o/openldap2.3/libldap-2.3-0_2.3.30-5+etch2_mips.deb
Size/MD5 checksum: 258028 4cd6d9a297dc6447e4f8ffb91d1ddddc

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/o/openldap2.3/slapd_2.3.30-5+etch2_mipsel.deb
Size/MD5 checksum:1188250 7fa6e8454be9cc2b5619fd05c088e666
http://security.debian.org/pool/updates/main/o/openldap2.3/libldap-2.3-0_2.3.30-5+etch2_mipsel.deb
Size/MD5 checksum: 258632 369f2d0a5adc823edf8c8dcc7de8a34a
http://security.debian.org/pool/updates/main/o/openldap2.3/ldap-utils_2.3.30-5+etch2_mipsel.deb
Size/MD5 checksum: 186796 9c611e11a90f62302cab63f0561d0d1d

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/o/openldap2.3/slapd_2.3.30-5+etch2_powerpc.deb
Size/MD5 checksum:1243660 2a68e3d27c0238061fdf2aa841befa23
http://security.debian.org/pool/updates/main/o/openldap2.3/ldap-utils_2.3.30-5+etch2_powerpc.deb
Size/MD5 checksum: 188790 d274c287d39d1a75bb4b6474ac1c6f34
http://security.debian.org/pool/updates/main/o/openldap2.3/libldap-2.3-0_2.3.30-5+etch2_powerpc.deb
Size/MD5 checksum: 272242 896e4fe8de21568e3251f8060c58b145

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/o/openldap2.3/ldap-utils_2.3.30-5+etch2_s390.deb
Size/MD5 checksum: 168388 66e6090f492708f524b83e990857cf83
http://security.debian.org/pool/updates/main/o/openldap2.3/slapd_2.3.30-5+etch2_s390.deb
Size/MD5 checksum:1240878 8b841b579a2ed5f7c990e5ffbcf76847
http://security.debian.org/pool/updates/main/o/openldap2.3/libldap-2.3-0_2.3.30-5+etch2_s390.deb
Size/MD5 checksum: 291518 c49e29b487788b2d5a2025cedacf5ee6

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/o/openldap2.3/ldap-utils_2.3.30-5+etch2_sparc.deb
Size/MD5 checksum: 155004 ec1fc16d622ec4b1ecf2e2ca8b12d398
http://security.debian.org/pool/updates/main/o/openldap2.3/libldap-2.3-0_2.3.30-5+etch2_sparc.deb
Size/MD5 checksum: 256832 0fd6fcf2e1a0a54917c21009df1172f7
http://security.debian.org/pool/updates/main/o/openldap2.3/slapd_2.3.30-5+etch2_sparc.deb
Size/MD5 checksum:1167556 0e95399858cd08f38c143e57c25c3db0

-- Debian GNU/Linux unstable alias sid --

Fixed in version 2.4.10-3.

ORIGINAL ADVISORY:
http://www.us.debian.org/security/2008/dsa-1650

OTHER REFERENCES:
SA30853:
http://secunia.com/advisories/30853/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    0 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close