6th Feb 2003 [SBWID-5975]
COMMAND
	openldap setuid .ldaprc buffer overflow
SYSTEMS AFFECTED
	openldap all prior to 1.2.13-2 ?
PROBLEM
	In RedHat security advisory [RHSA-2003:040-07] :
	
	 http://www.redhat.com/solutions/security/news/
	
	--snip--
	OpenLDAP is a suite of  LDAP  (Lightweight  Directory  Access  Protocol)
	applications and development tools. LDAP  is  a  set  of  protocols  for
	accessing directory services. In an audit of OpenLDAP by SuSE, a  number
	of potential security issues were found:
	When reading configuration files, libldap would read the current  user's
	.ldaprc file even in applications being run with elevated privileges.
	Slurpd would overflow an internal buffer if  the  command-line  argument
	used with the -t or -r flags was too long, or if the name of a file  for
	which it attempted to create an advisory lock was too long.
	When parsing filters, the getfilter family  of  functions  from  libldap
	could be made to overflow an internal buffer by  supplying  a  carefully
	crafted ldapfilter.conf file.
	When processing LDAP entry display templates, libldap could be  made  to
	overflow  an  internal  buffer   by   supplying   a   properly   crafted
	ldaptemplates.conf file.
	When parsing an access control list, slapd could be made to overflow  an
	internal buffer.
	When constructing the  name  of  the  file  used  for  logging  rejected
	replication requests, slapd would overflow an  internal  buffer  if  the
	size of the generated name was too large,  and  could  be  tricked  into
	destroying the contents of any file owned by the  ldap  user  due  to  a
	race condition in the subsequent creation of the log file.
	Red Hat Linux users who use LDAP are  advised  to  install  the  updated
	openldap packages which are not vulnerable to these issues.
	--snap--
SOLUTION
	openldap-1.2.13-2 available