CVE-2008-2952

OpenLDAP 2.2.4-2.4.10 - Denial of Service via Crafted ASN.1 BER Datagrams

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-2952. PoCs published by Cameron Hotchkies.

AI-analyzed exploit summary This exploit demonstrates a remote denial-of-service vulnerability in OpenLDAP by sending a malformed packet to the slapd service, causing it to crash. The PoC uses a Perl one-liner to generate the payload and netcat to deliver it.

Description

liblber/io.c in OpenLDAP 2.2.4 to 2.4.10 allows remote attackers to cause a denial of service (program termination) via crafted ASN.1 BER datagrams that trigger an assertion error.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Cameron Hotchkies · textdoslinux
https://www.exploit-db.com/exploits/32000

This exploit demonstrates a remote denial-of-service vulnerability in OpenLDAP by sending a malformed packet to the slapd service, causing it to crash. The PoC uses a Perl one-liner to generate the payload and netcat to deliver it.

Classification
Working Poc 90%
Attack Type
Dos
Complexity
Trivial
Reliability
Reliable
Target: OpenLDAP 2.3.41 and other versions
No auth needed
Prerequisites: OpenLDAP slapd service running and accessible
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (31)

Core 31
Core References
Vendor Advisory vendor-advisory x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2008-0583.html
Third Party Advisory vendor-advisory x_refsource_gentoo
http://security.gentoo.org/glsa/glsa-200808-09.xml
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/31364
Third Party Advisory, VDB Entry vdb-entry signature x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10662
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/30917
Mailing List vendor-advisory x_refsource_apple
http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/43515
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2008/dsa-1650
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/30013
Mailing List mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2008/07/01/2
Vendor Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2008/2268
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/495320/100/0/threaded
Issue Tracking x_refsource_confirm
https://issues.rpath.com/browse/RPL-2645
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/30996
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/31436
Vendor Advisory vendor-advisory x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDVSA-2008:144
Mailing List mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2008/07/13/2
Vendor Advisory vendor-advisory x_refsource_ubuntu
http://www.ubuntu.com/usn/usn-634-1
Third Party Advisory x_refsource_misc
http://www.zerodayinitiative.com/advisories/ZDI-08-052/
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/30853
Third Party Advisory x_refsource_confirm
http://wiki.rpath.com/Advisories:rPSA-2008-0249
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/31326
Vendor Advisory vendor-advisory x_refsource_fedora
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00129.html
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/32254
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id?1020405
Vendor Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2008/1978/references
Vendor Advisory vendor-advisory x_refsource_fedora
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00109.html
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/32316

Scores

EPSS 0.5528
EPSS Percentile 98.1%

Details

CWE
CWE-399
Status published
Products (47)
openldap/openldap 2.2.4
openldap/openldap 2.2.5
openldap/openldap 2.2.6
openldap/openldap 2.2.7
openldap/openldap 2.2.8
openldap/openldap 2.2.9
openldap/openldap 2.3.4
openldap/openldap 2.3.5
openldap/openldap 2.3.6
openldap/openldap 2.3.7
... and 37 more
Published Jul 01, 2008
Tracked Since Feb 18, 2026