LDAP Exchange overflow crashes LDAP server

Risk Level: High risk vulnerability  High

Check or Attack Name: LDAP Exchange Overflow

Platforms: LDAP, Microsoft Exchange: 5.5
Description:

A buffer overflow exploit against Microsoft Exchange's LDAP (Lightweight Directory Access Protocol) server allows read access to the Exchange server directory by using an LDAP client. This buffer overflow consists of a malformed bind request that overflows the buffer and can execute arbitrary code. This attack can also cause the Exchange LDAP service to crash. This vulnerability exists in Microsoft Exchange Server version 5.5.

Remedy:

Microsoft has released patches to fix this problem. Users are encouraged to apply these as soon as possible.

References:

ISS Security Advisory #22, LDAP Buffer overflow against Microsoft Directory Services, http://xforce.iss.net/alerts/advise22.php3

Microsoft Security Bulletin MS99-009, Patch Available for "Malformed Bind Request" Vulnerability, http://www.microsoft.com/security/bulletins/ms99-009.asp


X-Force Logo
Know Your Risks