Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200606-17] OpenLDAP: Buffer overflow Vulnerability Scan
Vulnerability Scan Summary
OpenLDAP: Buffer overflow
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200606-17
(OpenLDAP: Buffer overflow)
slurpd contains a buffer overflow when reading very long hostnames from
the status file.
By injecting an overly long hostname in the status file, a possible hacker
could possibly cause the execution of arbitrary code with the
permissions of the user running slurpd.
There is no known workaround at this time.
All openLDAP users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-nds/openldap-2.3.22"
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.