Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: Mandrake Local Security Checks --> Category: infos

MDKSA-2002:075: nss_ldap Vulnerability Scan

Vulnerability Scan Summary
Check for the version of the nss_ldap package

Detailed Explanation for this Vulnerability Test

The remote host is missing the patch for the advisory MDKSA-2002:075 (nss_ldap).

A buffer overflow vulnerability exists in nss_ldap versions prior to 198. When
nss_ldap is configured without a value for the 'host' keyword, it attempts to
configure itself using SRV records stored in DNS. nss_ldap does not check that
the data returned by the DNS query will fit into an internal buffer, thus
exposing it to an overflow.
A similar issue exists in versions of nss_ldap prior to 199 where nss_ldap does
not check that the data returned by the DNS query has not been truncated by the
resolver libraries to avoid a buffer overflow. This can make nss_ldap attempt to
parse more data than what is actually available, making it vulnerable to a read
buffer overflow.
Finally, a format string bug in the logging function of pam_ldap prior to
version 144 exist.
All users are recommended to upgrade to these updated packages. Note that the
nss_ldap packages for 7.2, 8.0, and Single Network Firewall 7.2 contain the
pam_ldap modules.

Solution :
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.